I do it over Starlink. Only the "hub" cannot be behind the Starlink.
Even worse my remote network is NATted in a load-balancer (Starlink, or one of the three 4G mobile links), the Load balancer goes to a Mikrotik which does NAT for the Starlink router (because I use multiple Starlinks. My extensive network is not a Starlink subnet.) The Starlink router does NAT to its "dishy", the dishy is CGNATted in the Starlink network.
The 4G mobile Mikrotiks do NAT the LTE network from different providers. The LTE networks are CGNATted. Their traffic goes NATted to the WAN ports of the load-balancer.
I do have permanent connection to that remote network from home or when I travel anywhere, if just any of the links is operational.
My "hub" is the cheapest Mikrotik (hAP Lite) behind the ISP modem which does NAT. I only do port forwarding of one port to the "hub" in that ISP modem. On travel my Mikrotik Map Lite connects to any wifi network, and opens a VPN to my "hub" at home based on DDNS and that specific port. The "hAP Lite" has been contacted via the same DDNS and specific port by a Mikrotik router that is deep into that multi-natted-load-balanced-network served by Starlink, and 4G-mobile as failover.
The GL.inet router is one of the client devices in that remote wifi network. I do have full control on the GL.inet router to do remote experiments. (Wanted to set up things like Zerotier, but that does not fit in the SFT1200.) The Goodcloud link is just one exemple of a VPN from a device in a multi (many) NATted network. Only Goodcloud does not give me network access through their website. (GL.iNET documentation said something about site-to- site link, so maybe I just overlooked that possibility.)
My fallback on that large remote wifi network is also using "Mikrotiks BTH" very similar to Goodcloud. BTH App setting up a Wireguard link through Mikrotiks BTH-hub-servers to any registered Mikrotik router.
It's very easy to be in a host network and make a remote connectable access point, if they allow any form of VPN. (People in the office setting their PC on Teamviewer for the weekend, to access it from home !? Security managers nightmare)
EDIT: actually my personal "hub" setup with one port of a public DDNS IP forwarded to the "hub", is what "Goodcloud site to site" descibes: Site to Site - GL.iNet Router Docs 4
Yet another similar setup for that "hub" is the Wireguard Home server : Build your own WireGuard Home Server with two GL.iNet Routers - GL.iNet Router Docs 4
And if an open port with a public (even DDNS) IP address is not possible anywhere (friend or family) then there is still Astrorelay as hub. How to set up Wireguard server via Astrorelay - GL.iNet Router Docs 4
See: AstroRelay - Secure Tunnel for Remote Accessing Your Devices