<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Public IP but inbound traffic blocked - carrier-side firewall on Three 5G (GreenPacket Y5-210MU) in Broadband</title>
    <link>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/65846#M10484</link>
    <description>&lt;P&gt;Hey &lt;a href="https://community.three.co.uk/t5/user/viewprofilepage/user-id/34919"&gt;@MymsMan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I completely agree! Tailscale, ZeroTier, and NetBird are excellent solutions for secure remote access to a home network. They work really well without needing to open ports, without relying on changing public IPs, or deal with NAT issues. I personally use all three myself depending on the setup, and they are reliable and safe for most scenarios.&lt;/P&gt;&lt;P&gt;That said, I don’t think there’s any reason for Three to deploy restrictive firewalls on public IPv4 addresses.&lt;/P&gt;&lt;P&gt;For example, I run a personal web server that requires ports 80 and 443 to be open for HTTP/HTTPS traffic, including obtaining Let’s Encrypt certificates and reverse proxying. I also self-host my own Nextcloud instance (friends and family only) and occasionally a Minecraft server or two.&lt;/P&gt;&lt;P&gt;However, blocking all inbound traffic seems overly restrictive for users like me who are just trying to use their connections fairly.&lt;/P&gt;&lt;P&gt;While VPN overlays and mesh networks are fantastic for many scenarios, there are still legitimate cases where having true inbound connectivity makes things simpler, more reliable, and compatible with standard internet protocols.&lt;/P&gt;</description>
    <pubDate>Tue, 23 Dec 2025 17:01:06 GMT</pubDate>
    <dc:creator>Overlord</dc:creator>
    <dc:date>2025-12-23T17:01:06Z</dc:date>
    <item>
      <title>Public IP but inbound traffic blocked - carrier-side firewall on Three 5G (GreenPacket Y5-210MU)</title>
      <link>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/65839#M10482</link>
      <description>&lt;P&gt;I am hoping someone from Three’s technical team can clarify what is actually being provided on 5G broadband. After detailed testing, it is clear that although Three does issue &lt;EM&gt;public IPv4 addresses&lt;/EM&gt;, unsolicited inbound connectivity is still blocked upstream in a way that behaves like CGNAT.&lt;/P&gt;&lt;P&gt;I hope to confirm and validate if others see the same behaviour while on the "&lt;STRONG&gt;3internet" APN&lt;/STRONG&gt;.&lt;/P&gt;&lt;H3&gt;My setup&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;Three 5G Broadband&lt;/LI&gt;&lt;LI&gt;GreenPacket Y5-210MU (Outdoor CPE)&lt;/LI&gt;&lt;LI&gt;IP Passthrough enabled&lt;/LI&gt;&lt;LI&gt;My own router is connected behind it (GL-iNet Flint 2 w/ OpenWrt 24.10.4)&lt;/LI&gt;&lt;LI&gt;Local firewall disabled / DMZ tested / no local port blocking&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;**&lt;STRONG&gt;NOTE&lt;/STRONG&gt;: This was also tested using Eero to rule out misconfigurations. However, this behaviour is persistent across all devices and should be reproducible.&lt;/P&gt;&lt;H3&gt;IP details assigned by Three&lt;/H3&gt;&lt;PRE&gt;IP Address:  92.40.102.[&lt;EM&gt;REDACTED&lt;/EM&gt;]
Gateway:     92.40.102.13
Netmask:     255.255.255.0
DNS:         92.40.102.13, 192.168.0.1&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;This is &lt;STRONG&gt;not classic CGNAT&lt;/STRONG&gt; (per RFC 6598, 100.64.0.0/10)&lt;/LI&gt;&lt;LI&gt;It is a public IPv4 within a shared &lt;STRONG&gt;/24&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;BR /&gt;Problem: Inbound connectivity does not work&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;Port forwarding &lt;U&gt;&lt;STRONG&gt;does nothing&lt;/STRONG&gt;&lt;/U&gt;&lt;/LI&gt;&lt;LI&gt;DMZ &lt;U&gt;&lt;STRONG&gt;does nothing&lt;/STRONG&gt;&lt;/U&gt;&lt;/LI&gt;&lt;LI&gt;UPnP &lt;U&gt;&lt;STRONG&gt;does nothing&lt;/STRONG&gt;&lt;/U&gt;&lt;/LI&gt;&lt;LI&gt;IP Passthrough &lt;U&gt;&lt;STRONG&gt;does nothing&lt;/STRONG&gt;&lt;/U&gt;&lt;/LI&gt;&lt;LI&gt;Disabling the router firewall &lt;U&gt;&lt;STRONG&gt;does nothing&lt;/STRONG&gt;&lt;/U&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Unsolicited inbound packets never reach my equipment.&lt;/P&gt;&lt;H3&gt;&lt;BR /&gt;Diagnostics performed&lt;/H3&gt;&lt;H4&gt;1) Nmap scan of my assigned IP&amp;nbsp;&lt;/H4&gt;&lt;P&gt;The following nmap commands were executed from another network (Outside Three's network):&lt;/P&gt;&lt;PRE&gt;nmap -Pn 92.40.102.[&lt;EM&gt;REDACTED&lt;/EM&gt;]&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;Why Nmap?&lt;/STRONG&gt;&amp;nbsp;It is a simple standard tool to determine port state: &lt;STRONG&gt;open&lt;/STRONG&gt;, &lt;STRONG&gt;closed&lt;/STRONG&gt;, or &lt;STRONG&gt;filtered&lt;/STRONG&gt; (RFC 793, TCP).&lt;/P&gt;&lt;PRE&gt;Host is up.
PORT     STATE     SERVICE
22/tcp   &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;ssh
23/tcp   &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;telnet
25/tcp   &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;smtp
139/tcp  &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;netbios-ssn
445/tcp  &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;microsoft-ds
1900/tcp &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;upnp
2869/tcp &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;icslap&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;"Filtered&lt;/STRONG&gt;" indicates packets are &lt;STRONG&gt;dropped before reaching my router&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Confirms the issue is upstream&lt;/STRONG&gt;, &lt;EM&gt;not local&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;2) Nmap scan of a random IP in the same /24&lt;/H4&gt;&lt;PRE&gt;nmap -Pn 92.40.102.99&lt;/PRE&gt;&lt;PRE&gt;Host is up.
PORT     STATE     SERVICE
25/tcp   &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;smtp
139/tcp  &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;netbios-ssn
445/tcp  &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;microsoft-ds
1900/tcp &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;upnp
2869/tcp &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;icslap&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;Same &lt;STRONG&gt;filtered&lt;/STRONG&gt; pattern&lt;/LI&gt;&lt;LI&gt;Which confirms that&amp;nbsp;&lt;STRONG&gt;filtering does occur at the carrier level across the entire subnet&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;3) Nmap scan of the assigned gateway&lt;/H4&gt;&lt;PRE&gt;nmap -Pn 92.40.102.13&lt;/PRE&gt;&lt;PRE&gt;PORT     STATE    SERVICE
53/tcp   &lt;FONT color="#339966"&gt;&lt;STRONG&gt;open    &lt;/STRONG&gt;  &lt;/FONT&gt;domain
22/tcp   &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;ssh
25/tcp   &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;smtp
80/tcp   &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;http
443/tcp  &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;https
445/tcp  &lt;FONT color="#993300"&gt;&lt;STRONG&gt;filtered &lt;/STRONG&gt; &lt;/FONT&gt;microsoft-ds&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;Port &lt;STRONG&gt;53&lt;/STRONG&gt; (DNS) &lt;STRONG&gt;open&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;--&amp;gt;&amp;nbsp;&lt;/STRONG&gt;the gateway is a service endpoint, not a simple router&lt;/LI&gt;&lt;LI&gt;All other ports are&amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#993300"&gt;filtered&lt;/FONT&gt;&amp;nbsp;--&amp;gt;&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;stateful &lt;FONT color="#993300"&gt;firewall&lt;/FONT&gt;&lt;/STRONG&gt; actively blocks inbound connections&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This explains why port forwarding, DMZ, IP Passthrough, and UPnP have no effect...&amp;nbsp; Basically, all packets are &lt;STRONG&gt;filtered&lt;/STRONG&gt; &lt;STRONG&gt;before they even reach your home equipment.&lt;/STRONG&gt;&lt;/P&gt;&lt;H3&gt;Technical analysis/references&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;So, we are assigned a Public IPv4, but inbound is &lt;STRONG&gt;blocked&lt;/STRONG&gt;, i.e., using &lt;STRONG&gt;a carrier-side firewall / shared subnet&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;This behaviour aligns with:&lt;OL&gt;&lt;LI&gt;RFC 6092 -&amp;nbsp;&lt;STRONG&gt;Stateful firewall considerations&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;RFC 4787 -&amp;nbsp;&lt;STRONG&gt;NAT endpoint filtering&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;RFC 793 -&amp;nbsp;&lt;STRONG&gt;TCP handshake semantics&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;This functionality is &lt;STRONG&gt;equivalent to CGNAT&lt;/STRONG&gt; from an end-user's perspective.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Why does this matter, and what does it affect?&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;"&lt;STRONG&gt;Public IP"&lt;/STRONG&gt;&amp;nbsp;usually implies &lt;EM&gt;inbound routability&lt;/EM&gt;, but here it &lt;STRONG&gt;does not&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;IP Passthrough suggests &lt;EM&gt;direct reachability&lt;/EM&gt;, but it is still &lt;STRONG&gt;blocked upstream&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;It affects:&lt;UL&gt;&lt;LI&gt;Home VPN Servers&lt;/LI&gt;&lt;LI&gt;Game Servers / Open NAT&lt;/LI&gt;&lt;LI&gt;Self-hosted services&lt;/LI&gt;&lt;LI&gt;CCTV / remote access&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Questions for Three&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;Is Three intentionally deploying a &lt;STRONG&gt;carrier-side stateful firewall on public IPv4 pools&lt;/STRONG&gt; for 5G broadband?&lt;/LI&gt;&lt;LI&gt;If not, can this be officially confirmed so we as customers know what to expect?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I just want clarity on what level of connectivity is provided.&lt;/P&gt;&lt;H2&gt;&lt;BR /&gt;TL;DR&lt;/H2&gt;&lt;P&gt;Three 5G provides a public IPv4 address, but inbound traffic is blocked by a &lt;STRONG&gt;carrier-side stateful firewall applied to a shared /24 subnet&lt;/STRONG&gt;, making it functionally equivalent to CGNAT. Verified via Nmap scans of &lt;STRONG&gt;my IP&lt;/STRONG&gt;, a &lt;STRONG&gt;random IP&lt;/STRONG&gt; in the same subnet, and &lt;STRONG&gt;the gateway&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 16:27:25 GMT</pubDate>
      <guid>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/65839#M10482</guid>
      <dc:creator>Overlord</dc:creator>
      <dc:date>2025-12-23T16:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP but inbound traffic blocked - carrier-side firewall on Three 5G (GreenPacket Y5-210MU)</title>
      <link>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/65841#M10483</link>
      <description>&lt;P&gt;I use Tailscale to allow inbound connectivity to my home network from remote locations and it works well.&lt;/P&gt;&lt;P&gt;There is no need to open ports or use the external IP address which changes every time the hub reconnects.&lt;/P&gt;&lt;P&gt;See&amp;nbsp;&lt;A href="https://community.three.co.uk/t5/Broadband/Remotely-connecting-to-Three-home-network-with-VPN/td-p/50845" target="_blank"&gt;https://community.three.co.uk/t5/Broadband/Remotely-connecting-to-Three-home-network-with-VPN/td-p/50845&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 16:39:30 GMT</pubDate>
      <guid>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/65841#M10483</guid>
      <dc:creator>MymsMan</dc:creator>
      <dc:date>2025-12-23T16:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP but inbound traffic blocked - carrier-side firewall on Three 5G (GreenPacket Y5-210MU)</title>
      <link>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/65846#M10484</link>
      <description>&lt;P&gt;Hey &lt;a href="https://community.three.co.uk/t5/user/viewprofilepage/user-id/34919"&gt;@MymsMan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I completely agree! Tailscale, ZeroTier, and NetBird are excellent solutions for secure remote access to a home network. They work really well without needing to open ports, without relying on changing public IPs, or deal with NAT issues. I personally use all three myself depending on the setup, and they are reliable and safe for most scenarios.&lt;/P&gt;&lt;P&gt;That said, I don’t think there’s any reason for Three to deploy restrictive firewalls on public IPv4 addresses.&lt;/P&gt;&lt;P&gt;For example, I run a personal web server that requires ports 80 and 443 to be open for HTTP/HTTPS traffic, including obtaining Let’s Encrypt certificates and reverse proxying. I also self-host my own Nextcloud instance (friends and family only) and occasionally a Minecraft server or two.&lt;/P&gt;&lt;P&gt;However, blocking all inbound traffic seems overly restrictive for users like me who are just trying to use their connections fairly.&lt;/P&gt;&lt;P&gt;While VPN overlays and mesh networks are fantastic for many scenarios, there are still legitimate cases where having true inbound connectivity makes things simpler, more reliable, and compatible with standard internet protocols.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 17:01:06 GMT</pubDate>
      <guid>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/65846#M10484</guid>
      <dc:creator>Overlord</dc:creator>
      <dc:date>2025-12-23T17:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Public IP but inbound traffic blocked - carrier-side firewall on Three 5G (GreenPacket Y5-210MU)</title>
      <link>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/66020#M10508</link>
      <description>&lt;P&gt;I don't think Three have a Technical Team, at least not any customer facing people.&amp;nbsp; I use Three for exactly this reason, that the "3internet" APN has historically allocated a 1:1 public IP address that can receive incoming connections.&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, from about November 2023, I have noticed weirdness, when out of the blue, the 3internet APN starts allocating CG-NAT'ed addresses.&amp;nbsp; Initially, when I first observed this behaviour the external public IP was changing extremely fast, like ~ once a minute causing all kinds of connection issues.&amp;nbsp; While the latest behaviour seems to use different public IP's depending on the service (ie HTTP/HTTPS traffic coming from one public IP and WireGuard connections coming from another!)&lt;/P&gt;&lt;P&gt;There have been discussions that this relates to how Three use an IPv6 core network and some people have found that by using IPv4 only in the APN settings they and can get a 1:1 IP again.&amp;nbsp; Myself, I can't get that to work and have to call the Technical Support team and waste hours of my life trying to explain the situation to someone that has very basic training (if at all) in networking.&amp;nbsp; If you can get to speak to someone and request that your account be IPv4 only on Three's side, that should fix it for you.&amp;nbsp; However, getting to speak to such a person is like having your teeth pulled by drunk gorilla who is more interested in removing your appendix.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;DNS:         92.40.102.13, 192.168.0.1&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Did you set the Private IP here, or was that assigned by Three?&amp;nbsp; Never seen anything like this before, my currently assigned DNS are 1&lt;SPAN class=""&gt;88.31.250.128,188.31.250.129&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 17:09:00 GMT</pubDate>
      <guid>https://community.three.co.uk/t5/Broadband/Public-IP-but-inbound-traffic-blocked-carrier-side-firewall-on-Three-5G-GreenPacket-Y5-210MU/m-p/66020#M10508</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2026-01-03T17:09:00Z</dc:date>
    </item>
  </channel>
</rss>

