So my testing:
client - RUT240 mobile data with IP 172.17.2.51
server router - RUT240 mobile data with IP 172.17.2.55, static LAN IP 192.168.1.90/24 and DMZ IP 192.168.1.199
server in LAN - 192.168.1.199
client - 172.17.2.51
root@RUT240-satturn:~# netcat 172.17.2.55 10000
a
b
c
^C
root@RUT240-satturn:~# tcpdump -i wwan0 port 10000
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wwan0, link-type EN10MB (Ethernet), capture size 262144 bytes
02:00:55.788743 IP 172.17.2.51.48209 > 172.17.2.55.10000: Flags [S], seq 3567746213, win 29200, options [mss 1460,sackOK,TS val 689427 ecr 0,nop,wscale 8], length 0
02:00:56.787582 IP 172.17.2.51.48209 > 172.17.2.55.10000: Flags [S], seq 3567746213, win 29200, options [mss 1460,sackOK,TS val 689527 ecr 0,nop,wscale 8], length 0
02:00:58.787554 IP 172.17.2.51.48209 > 172.17.2.55.10000: Flags [S], seq 3567746213, win 29200, options [mss 1460,sackOK,TS val 689727 ecr 0,nop,wscale 8], length 0
^C
3 packets captured
3 packets received by filter
0 packets dropped by kernel
server router - 172.17.2.55
root@RUT240-satturn:~# tcpdump -i wwan0 port 10000
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wwan0, link-type EN10MB (Ethernet), capture size 262144 bytes
10:33:25.790704 IP 172.17.2.51.48209 > 172.17.2.55.10000: Flags [S], seq 3567746213, win 29200, options [mss 1344,sackOK,TS val 689427 ecr 0,nop,wscale 8], length 0
10:33:26.514831 IP 172.17.2.51.48209 > 172.17.2.55.10000: Flags [S], seq 3567746213, win 29200, options [mss 1344,sackOK,TS val 689527 ecr 0,nop,wscale 8], length 0
10:33:28.435206 IP 172.17.2.51.48209 > 172.17.2.55.10000: Flags [S], seq 3567746213, win 29200, options [mss 1344,sackOK,TS val 689727 ecr 0,nop,wscale 8], length 0
^C
3 packets captured
3 packets received by filter
0 packets dropped by kernel
server in LAN - 192.168.1.199
matlala@nas-htpc ~ $ netcat -l 10000
^C
matlala@nas-htpc ~ $ sudo tcpdump -i eth0 port 10000 -n
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
10:33:25.913653 IP 172.17.2.51.48209 > 192.168.1.199.10000: Flags [S], seq 3567746213, win 29200, options [mss 1344,sackOK,TS val 689427 ecr 0,nop,wscale 8], length 0
10:33:26.637700 IP 172.17.2.51.48209 > 192.168.1.199.10000: Flags [S], seq 3567746213, win 29200, options [mss 1344,sackOK,TS val 689527 ecr 0,nop,wscale 8], length 0
10:33:28.558179 IP 172.17.2.51.48209 > 192.168.1.199.10000: Flags [S], seq 3567746213, win 29200, options [mss 1344,sackOK,TS val 689727 ecr 0,nop,wscale 8], length 0
^C
3 packets captured
3 packets received by filter
0 packets dropped by kernel