Hi plunet, thank you for replying.
You mentioned that running any other services requiring direct inbound connections on IPv4 may affect me. I work from home and I am connected to the main server at the head office, would this setup work for me?
Now it works with Virgin Media no issues at all.
Another thing you mentioned is that, in your opinion, consumer VPNs like NordVPN do little to improve security and can be a detriment. What do you mean? It is a well-known fact that if one uses a VPN, the ISP or anyone else cannot see what I am downloading or uploading.
Toob offers an option for paying extra to have a static IP address, would this provide more security when using VPNs?
Regards
If you have never changed any settings on your Virgin router for port forwarding or DMZ settings then there's a very high chance that everything you do now would continue to work with Toob.
You mention that you work remotely, you could ask your corporate IT support if they know of any reason whether a move to a new ISP that uses CGNAT for IPv4 but with native IPv6 support would cause any problems for VPN use. If you have ever used your phone hotspot for internet on your work laptop with the VPN running and that worked again that is a good indicator it should work with Toob.
So, you asked about consumer VPNs like NordVPN. They do give you a secure tunnel to an exit node on their network and that would usually eliminate any opportunity for your ISP to analyse your traffic... But it would be unencrypted from the exit node to the destination whether that is. Security is about end to end encryption but consumer VPNs only do half the job as it's only encrypted part of the way. Your corporate VPN gives you full end to end encryption to their services.
Noting that almost all consumer internet activity is already TLS encrypted by each individual web service all your ISP could usually see are your DNS queries (and options exist to hide this), the IP addresses to which you connect, and the amount of data you exchange with any IP. If you're not doing anything naughty is this data something you need to hide? Your ISP might share this info about what your IP is doing into ad networks for a bit of a kickback on targetted advertising but this is broadly manageable by you choosing the reject non-essential cookies on websites and services. And a data subject access request to your ISP could find out if they are doing this and then you can tell them to not do it - that's your right in law.
But by using a consumer VPN your source IP that services see from you when you're using the VPN is that of the exit node on the VPN network. Your own use might be benign, but you are likely rubbing shoulders on the same IP address with people who are up to naughtier stuff, and your own posture you are presenting in part via your source IP address, to your bank, to your email provider, your social network, etc. is weakened because you connect to their services from "anonymous" VPN services which maybe change frequently, jump between different countries, and from IP addresses where your posture is sullied by others using the same VPN provider who are up to naughtier stuff.
At my #dayjob anyone connecting into our services from an anonymous (consumer VPN) IP addresses is immediately knocked into an extra round of MFA because of the perceived additional risks of connections made from high risk anonymous IPs verses those from an ISP.
So whilst consumer VPNs do have a use to permit people to geo relocate to other locations to overcome content restrictions and see alternative pricing, my strong suggestion is that all the marketing around the better security they offer is largely BS.