domptg wrote: 08/21/2025
I'm planning to buy Poly IEEE 802.11ac Wi-Fi Adapter - USB for my Obi200 and see if this will help me with my incoming calls problem.
If you mean the discontinued OBiWIfi adapter, I have one, and that's not going to solve your problem.
The only difference is your OBi200 will now be connecting using WiFi (which can increase latency) instead of an ethernet cable. The underlying problem still exists. Wi-Fi doesn't bypass CGNAT, SIP ALG, or a firewall. I'm pretty sure the problem is related to CGNAT.
Generally, CG‑NAT is an IPv4 address-sharing model that can impair multiple classes of applications, particularly those that benefit from stable inbound reachability. This can also affect inbound self-hosting and some online gaming scenarios, and Fongo Home and Freephoneline users aren't the only ones negatively affected.
Some people may respond with, “I’m on CG‑NAT, and it works for me” (in fact, I think I read that online somewhere while searching). However, impacts are workload-, timeout-, and CPE-dependent. RFC 7021 notes that varying combinations of home routers and client devices can produce reduced or variable user experience. Anecdotal counterexamples do not invalidate the general limitations described in the documents cited below, which I've provided in case others are interested.
I. Technical basis in standards
A. RFC 6888 states that because subscribers do not receive unique IPv4 addresses, Carrier-Grade NATs “introduce substantial limitations in communications between subscribers and with the rest of the Internet” (RFC 6888,
https://datatracker.ietf.org/doc/html/rfc6888).
II. Documented impacts in multi-operator testing
A. RFC 7021 reports testing of NAT444 and Dual-Stack Lite impacts on common applications by CableLabs, Time Warner Cable, and Rogers Communications, and it identifies areas where adding a second layer of NAT disrupts common Internet applications (RFC 7021,
https://www.rfc-editor.org/rfc/rfc7021.html).
B. RFC 7021’s scope includes peer-to-peer applications, online gaming, FTP, and SIP calls, which is relevant to both home hosting use cases and real-time communications (RFC 7021,
https://www.rfc-editor.org/rfc/rfc7021.html).
III. Examples of user-facing problems that can follow from CG-NAT
A. VoIP and real-time communications
NAT traversal for UDP-based flows can be sensitive to mapping timeouts and address sharing, which can present as unreliable media paths, such as one-way or missing audio in some environments.
B. Home server hosting
RFC 7021 states that “FTP sessions to servers located inside the home (ex. behind two layers of NAT) failed," and that connectivity succeeded when the CGN was bypassed, which illustrates why inbound hosting and self-hosted services can be unreliable under CG-NAT/NAT444 (RFC 7021,
https://www.rfc-editor.org/rfc/rfc7021.html).
C. Online and peer-to-peer gaming
RFC 7021 reports that “peer-to-peer gaming using Xbox . . . failed in both the NAT444 and Dual-Stack Lite environments”, and it describes a failure mode in which two users shared an outside IP address and attempted to connect to the same port (RFC 7021,
https://www.rfc-editor.org/rfc/rfc7021.html).
The Xbox example from RFC 7021 isn't isolated. Similar NAT444/CG‑NAT constraints can also affect other gaming platforms (
https://steamcommunity.com/app/1203620/ ... 695567175/), depending on the title’s networking model. The inability to forward or open ports may also prove challenging.
D. Shared-IP collateral effects
Cloudflare notes that because many users can share a single public IP under CG-NAT, IP-based security controls can inadvertently rate-limit or block legitimate users due to the behaviour of other users behind the same shared address (Cloudflare,
https://blog.cloudflare.com/detecting-c ... al-damage/). Secondary reporting on Cloudflare’s work discusses similar collateral throttling effects for users behind CG-NAT (The Register,
https://www.theregister.com/2025/11/03/ ... _research/).
It may be possible in some cases to mitigate CG-NAT limitations by obtaining a public (relatively static) IPv4 address, using IPv6 end-to-end where available (and it's not currently with Fongo Home Phone and Freephoneline), or tunnelling traffic through a VPN or VPS that provides public IPv4 egress. One general example of working around CG-NAT using a VPS and WireGuard is here (not specific to Fongo Home Phone):
https://www.reddit.com/r/unRAID/comment ... nat_using/.
Basically,
1. rent a VPS with a public IPv4 address,
2. install WireGuard on the VPS,
3. set up WireGuard at home on a router or server, and
4. configure policy routing or split tunnelling so that only the HT-801 ATA routes through the WireGuard tunnel.
Again, that's just an example and may not work.
VPN and VPS configurations add cost and operational complexity and may also introduce increased latency and jitter. I will not be supporting VPN or VPS tunnelling configurations here, as supporting tunnelling runs outside the scope of these user-to-user forums (as does supporting other products and services than those offered by Fongo). Also, if the tunnel drops, then so does your Fongo Home Phone (or Freephoneline) service. Consequently, it's much simpler to say Rogers 5G Home Internet/w CG-NAT doesn't work with Fongo Home Phone and Freephoneline.
Personally, I try to avoid any internet service that forces CG-NAT upon me.