Skip to content
IoT and Connectivity

Your Teltonika Router Has a Public IP SIM. Here Is Why That Is a Problem – and How to Fix It.

By Nick Appleby 4 March 2026 46 min read
Your Teltonika Router Has a Public IP SIM. Here Is Why That Is a Problem – and How to Fix It.

Hundreds of thousands of Teltonika routers are deployed across the UK with a public IP SIM inserted and the default configuration left largely untouched. Many of them are protecting battery management systems, energy meters, building automation controllers, and industrial PLCs. Some of them are on Shodan right now. This guide covers both routes to a secure deployment – switching SIM type, or locking down what you already have.

Important disclaimer. This guide is intended as a practical reference for engineers, installers, and system integrators working with Teltonika cellular routers. Network security is a constantly evolving field. The configuration examples shown here reflect Teltonika firmware behaviour at the time of writing but menu locations, feature names, and defaults may change between firmware versions. Always test configuration changes in a controlled environment before applying to live systems. If you are responsible for critical national infrastructure, industrial control systems, or any installation where a security failure could result in physical harm, you should engage a qualified cybersecurity professional in addition to using this guide. The author accepts no liability for loss or damage arising from the application of this guidance.

The Problem With Public IP SIMs in IoT

When an IoT SIM is described as having a “public IP”, it means the SIM is assigned an IP address that is routable on the public internet – either static (always the same) or dynamic (changes on each connection or periodically). Either way, any device connected to that SIM, and any device on a network behind a router using that SIM, is potentially reachable from anywhere in the world.

This is often sold as a feature. And for certain use cases – where you need to initiate inbound connections to a device, or where you are running your own VPN server infrastructure and can control access properly – it can be. The problem arises when a public IP SIM is used as a convenience shortcut in place of a properly designed remote access architecture. And in the world of cellular IoT, that happens constantly.

The typical failure scenario looks like this: an installer fits a Teltonika RUTX11 or RUT241 to a battery energy storage system. They set up port forwarding so the monitoring team can access the BMS web interface on port 80 and the Modbus TCP gateway on port 502. They change the router’s admin password. They put the public IP in a spreadsheet. They drive away. Nobody ever thinks about it again – until something goes wrong.

Dynamic does not mean safe.

Some installers assume that a dynamic public IP is “safe enough” because the IP changes. In practice, automated scanning tools like Shodan, Censys, and ZMap scan the entire IPv4 address space continuously. Your router will be fingerprinted within hours of getting a new IP. Dynamic simply means the fingerprint moves – it does not mean attackers cannot find it.

What Shodan Sees – and What Attackers Do With It

Shodan is a publicly accessible search engine that indexes internet-connected devices by scanning for open ports and grabbing service banners. It is a legitimate security research tool, and it is also freely used by attackers to find targets. If your Teltonika router has a public IP and has any ports open – including the default WebUI port 80/443, SSH on port 22, or any port-forwarded service – there is a high probability it is indexed on Shodan.

A typical Shodan result for an exposed Teltonika router will show the device model, the firmware version banner, and which ports are open. From a model and firmware version, an attacker knows exactly which CVEs to try. From an open port 502, they know there is a Modbus device accessible. From port 102, it is S7comm (Siemens PLC). From port 44818, EtherNet/IP. These are industrial protocols with minimal or no authentication built in – they were never designed to face the public internet.

Once a device is found, automated attack tools run through several phases: credential stuffing using default and common passwords, protocol-specific exploitation, and in the case of industrial protocols, direct command injection to the downstream device. The Teltonika router itself may survive this unscathed – but the BMS, PLC, or controller behind it may not.

Check your own exposure right now.

Go to shodan.io and search for your public IP address. If you find your device listed there with open ports visible, treat this as an urgent remediation item, not a future consideration. Free Shodan accounts can run basic IP lookups.

Real-World Impact: When a BMS Controller Locks Up at 2am

Battery management systems, building energy management systems, and industrial controllers often have a self-protection mechanism built in: after a configurable number of failed authentication attempts, they lock the account, disable the communication port, or in some cases halt the process entirely and require a manual reset. This is sensible security design for a device that expects to sit inside a protected network. It is catastrophic when that device is exposed to the internet and brute-force attempts are arriving at thousands of attempts per minute.

The consequences are not theoretical. An energy storage system that halts due to a brute-force lockout will stop charging and discharging at the grid. If it was providing frequency response services, it drops off the grid at exactly the moment it was contracted to stabilise it. If it was providing peak shaving to an industrial facility, the facility’s demand charges spike. If it was keeping a hospital’s backup power topped up, someone is now worried about the state of those batteries. The financial and safety implications can be severe – and the root cause is a port forwarding rule that nobody thought to restrict.

Modbus TCP has no authentication.

If you are port-forwarding Modbus TCP (port 502) through a Teltonika router to a BMS or energy meter, any attacker who finds that open port can read and write registers with zero authentication required. This is not a Teltonika issue – it is a fundamental characteristic of the Modbus protocol. The only safe place for Modbus TCP is inside a protected network or VPN tunnel.


Option 1

Switch to a Private IP SIM

The cleanest architectural solution is to remove the problem at the network layer. A private IP SIM is allocated an IP address from a private range (typically 10.x.x.x or 172.16.x.x) that is not routable on the public internet. No scanner, no attacker, and no automated tool can reach your device directly – because there is no public path to it.

Access to devices on a private IP SIM is normally provided through a VPN concentrator operated by the SIM provider, which creates a secure tunnel between your management network and the private IP range used by the SIMs. Your monitoring station connects to the VPN, gets access to the 10.x.x.x range, and can reach the device. Nobody else can.

How Private IP SIM Pricing Actually Works

Private IP SIMs are typically available from specialist IoT MVNO providers and some of the main network operators through their IoT divisions. The pricing model varies significantly and it is worth understanding what you are actually paying for before committing.

The SIM itself may cost no more than a standard data SIM. The cost that catches people out is the VPN infrastructure. Some providers charge a one-off setup fee per VPN connection – and for a single SIM deployment, this can be disproportionate. Fees of £50 or more for a single-SIM OpenVPN setup are not uncommon from some IoT MVNO providers. If you are deploying a fleet of 100 SIMs and paying one setup fee, that is sensible. If you are connecting one BMS controller in a building, it may price the solution out of reach.

Advantages

  • Device is completely unreachable from the public internet
  • No router-level firewall configuration required for protection
  • Simpler to explain and audit for compliance purposes
  • Port forwarding rules become irrelevant
  • No exposure even if router firmware is outdated

Disadvantages

  • Higher cost per SIM, especially for single-site deployments
  • VPN setup fees from some providers can be significant
  • You depend on the SIM provider’s VPN infrastructure uptime
  • Less flexibility – VPN access often tied to the provider’s client
  • Harder to switch provider mid-contract
  • Some providers only offer OpenVPN; WireGuard options are rarer
Tip – ask about multi-SIM pricing before assuming it is too expensive.

If you have, or expect to have, more than five SIMs on a single customer site or across a portfolio, the economics of private IP often become favourable quickly. Get a quote that includes the VPN setup as a one-off fleet cost rather than a per-SIM cost, and compare that against the engineering time you will spend hardening individual Teltonika routers.

When Private IP SIM Is the Right Answer

Private IP SIM is the cleanest choice when: the SIM provider’s pricing is reasonable for your deployment scale; you need to satisfy a compliance requirement that mandates network-layer isolation; you are connecting devices with no built-in authentication (Modbus TCP, raw serial-over-IP); or you are deploying in a sector where a security audit is likely. It is also worth considering when the end customer has a security-conscious IT or OT team who will ask how the device is protected – “it’s behind a private IP SIM with a managed VPN” is a cleaner answer than a lengthy explanation of firewall rules.


Option 2

Harden the Teltonika Router on a Public IP SIM

If you are keeping the public IP SIM – whether for cost reasons, because you are mid-contract, or because you need the flexibility of direct internet access for outbound connections – you can achieve a strong security posture entirely within the Teltonika router itself. This is not a second-best option. A properly hardened Teltonika with a public IP SIM, running a VPN server with all other inbound traffic blocked, is a secure architecture. The key word is properly.

The following sections walk through each layer of the hardening process in order of priority. Apply them in sequence. Do not skip to the VPN section without completing the firewall steps first.

Firewall Hardening – Block All Inbound by Default

The most important single change you can make to a Teltonika router on a public IP SIM is to set the default inbound firewall policy to DROP, and then selectively allow only the specific traffic you intend to permit. This is the “default deny” principle, and it is the foundation of every properly designed network security policy.

Teltonika’s RutOS (the operating system on all RUT/RUTX/TRB series devices) uses an iptables-based firewall with a web interface under Network > Firewall. By default, the WAN zone (your SIM interface) is set to reject inbound connections – but this default can be less comprehensive than it appears, particularly when port forwarding rules are in place. You need to verify and tighten it explicitly.

1
Navigate to Network > Firewall > General Settings

Check the WAN zone input and forward policies. Set input to DROP rather than REJECT. DROP silently discards the packet; REJECT sends an ICMP error back, confirming the device exists to the scanner.

2
Disable remote access to the WebUI over WAN

Go to System > Administration > Access Control. Ensure HTTP and HTTPS access from the WAN interface is disabled. The router’s management interface should only be reachable from the LAN side or through an authenticated VPN tunnel.

3
Disable SSH access from WAN

In the same Access Control section, ensure SSH is not accessible from the WAN interface. If you need SSH access remotely, tunnel it through your VPN. SSH on a public IP, even with key-based authentication, is a target for exploit attempts against the SSH daemon itself.

4
Audit and remove all unnecessary port forwarding rules

Go to Network > Firewall > Port Forwards. Delete any rule you cannot explain or justify. Every port forwarding rule is a hole in your perimeter. The only rules that should exist are the VPN server ports and any explicitly required, hardened exceptions.

5
Block ICMP ping responses from WAN (optional but recommended)

Under Network > Firewall > Traffic Rules, add a rule to drop ICMP echo requests from the WAN zone. This removes a trivial confirmation method for scanners, though port scanning will still find open ports.

Do not lock yourself out.

Before applying firewall rules that block all WAN inbound access, confirm you have LAN-side access to the router, or that you have an RMS connection established that you can use to recover access. Applying a DROP-all-WAN rule without a recovery path means a site visit to recover the device.

Setting Up OpenVPN Server on Your Teltonika

With the firewall locked down, the next step is to establish your controlled access channel. OpenVPN is the most widely supported VPN protocol, compatible with every major operating system and a large number of monitoring platforms. Teltonika’s RutOS has a mature OpenVPN server implementation accessible through the WebUI.

In this configuration the Teltonika router acts as the VPN server. Remote users (engineers, monitoring stations) connect as VPN clients. Once connected, they can reach the LAN-side devices through the VPN tunnel as if they were physically on the LAN. All access is authenticated, encrypted, and logged.

1
Navigate to Services > VPN > OpenVPN

Click Add New Instance and select Server mode. Give it a descriptive name such as remote-access.

2
Generate TLS certificates

Use the built-in certificate generator to create a CA certificate, server certificate, and server key. Download these immediately and store them securely offline.

3
Configure the VPN network

Set a VPN subnet that does not overlap with your LAN. If your LAN is 192.168.1.0/24, use something like 10.10.10.0/24 for the VPN. Set the protocol to UDP. Default port 1194 is fine, but a non-standard port provides minor additional obscurity.

4
Enable push routes to the LAN

In the advanced settings, push your LAN subnet to connected clients: push “route 192.168.1.0 255.255.255.0”. Without this, VPN clients can reach the tunnel endpoint but not the devices behind it.

5
Create individual client credentials per user

For each engineer or monitoring system, generate a unique client certificate and key pair. Export a .ovpn configuration file for each. Individual certificates mean you can revoke access for one person without affecting others.

6
Open only the VPN port in the firewall

Under Network > Firewall > Traffic Rules, add a rule to accept UDP traffic from WAN to the router on your chosen OpenVPN port. This should be the only inbound rule from WAN. Everything else remains dropped.

Tip – use tls-auth for an additional layer of protection.

Enable the tls-auth directive in your OpenVPN configuration with a pre-shared static key. Packets without the correct HMAC header are dropped before the TLS handshake begins – protecting the VPN daemon from unauthenticated connection attempts and denial-of-service attacks.

WireGuard – The Faster, Leaner Alternative

WireGuard is a modern VPN protocol that is significantly simpler in design than OpenVPN, uses state-of-the-art cryptography by default, and has considerably less code surface area – which translates to fewer potential vulnerabilities. It is also noticeably faster in terms of handshake time and throughput, which matters for latency-sensitive applications like real-time BMS monitoring dashboards.

Teltonika added WireGuard support to RutOS from firmware version 7.x onwards, and it is now available across the RUTX and RUT series. WireGuard uses a public/private key pair for each peer – no certificate authorities, no CRLs, just keys.

1
Navigate to Services > VPN > WireGuard

Create a new WireGuard interface. The router generates its key pair automatically. Note the public key – you will need it for client configurations.

2
Assign a VPN interface IP

Give the WireGuard interface an IP address within your chosen VPN subnet, for example 10.20.0.1/24.

3
Add peers for each client

Generate a WireGuard key pair on each client device (Windows/Mac/Linux/iOS/Android WireGuard app). Add each client’s public key as a peer on the Teltonika, assigning a specific allowed IP within the VPN subnet (e.g. 10.20.0.2/32 for engineer 1). This gives you per-user access control without certificate infrastructure.

4
Configure each client

Each client needs: the server’s public key, the server’s public IP and WireGuard port, the client’s own private key, the client’s assigned VPN IP, and the allowed IPs to route through the tunnel. Teltonika’s WebUI can generate a QR code for mobile clients.

WireGuard’s “stealth” behaviour – important to understand.

WireGuard does not respond to connection attempts from peers whose public keys are not in its allowed list. Any attempt to initiate a connection without the correct key material receives no response – significantly better behaviour than OpenVPN under attack conditions.

IP Whitelisting for Monitoring Companies and NOC Access

Some monitoring scenarios require a persistent, always-on connection rather than an on-demand VPN tunnel. A NOC that needs to poll your BMS every 60 seconds cannot rely on an engineer manually connecting a VPN client before each poll cycle. In these cases, IP whitelisting – allowing inbound connections only from specific known IP addresses – is a practical solution combined with proper firewall rules.

IP whitelisting is an additional control, not a replacement for VPN.

IP addresses can be spoofed at the network layer. IP whitelisting provides a useful additional layer of defence but should always be combined with application-layer authentication on the destination service. Never allow unrestricted access to an unauthenticated protocol like Modbus TCP from a whitelisted IP.

Adding a Whitelisted IP Rule in RutOS

Under Network > Firewall > Traffic Rules, add a rule that allows inbound traffic from a specific source IP to a specific destination port. For example, to allow a monitoring company to poll a Modbus gateway on port 502:

  • Name: allow-monitoring-modbus
  • Source zone: WAN
  • Source address: [monitoring company’s static IP]
  • Destination zone: LAN
  • Destination address: [BMS device LAN IP]
  • Destination port: 502
  • Action: ACCEPT
Tip – always ask your monitoring provider for a static IP.

Any competent monitoring NOC should be able to provide a static IP or a small CIDR range for their outbound scanning traffic. If they cannot, that is worth factoring into your assessment of their operational maturity. Allowing inbound access from a dynamic IP defeats the purpose of whitelisting entirely.

For sites where multiple parties need access, create a separate named firewall rule for each party. This gives you the ability to revoke a specific party’s access by disabling a single clearly-named rule without affecting anyone else. Keep a register reviewed at least annually and whenever a contractor relationship ends.

If You Must Use Port Forwarding – Do It Properly

The strongest recommendation in this guide is to eliminate port forwarding to LAN devices entirely and replace it with VPN access. However, legacy systems, third-party monitoring contracts, or client requirements sometimes make this unavoidable in the short term. If that is your situation, apply every one of the following controls.

1
Always combine port forwarding with source IP restriction

In RutOS, every port forwarding rule can have a source IP address condition applied. Always specify the source IP or range. Any restriction is better than none.

2
Use non-standard external ports

Port scanners sweep well-known port numbers first. Forwarding external port 58291 to internal port 80 means you are not in the first wave of automated scan hits. This is security through obscurity and not a substitute for real controls – but combined with source IP restriction, it reduces noise significantly.

3
Enable connection rate limiting

In Network > Firewall > Traffic Rules, add rate limiting rules that drop connections from a source IP exceeding a defined rate. A monitoring poll should not require more than a handful of connection attempts per minute.

4
Never forward Modbus TCP, S7, or other unauthenticated industrial protocols

There is no safe way to expose these protocols on a public port. If you have an existing deployment doing this, escalate it as a critical remediation item immediately and route these protocols through a VPN tunnel only.

5
Document every rule with a business justification and review date

Port forwarding rules accumulate silently. Create a brief register for every active rule: what it does, why it exists, who requested it, and when it was last reviewed. Schedule a review at least every six months.

Teltonika Threat Prevention and Attack Detection

Teltonika’s RutOS includes several built-in security features worth enabling as part of a hardened deployment. These are not a substitute for the firewall and VPN configuration described above, but they provide additional layers of detection and active protection.

Attack Prevention

Under Network > Firewall > Attack Prevention, RutOS provides configurable protection against SYN flood attacks and port scan attempts. SYN flood protection limits the rate at which new TCP connection requests are accepted. Port scan detection identifies and blocks source IPs exhibiting scanning behaviour. Enable both as a baseline – the default thresholds are a reasonable starting point.

SSH Brute Force Protection

Under System > Administration > Access Control, enable the built-in brute force protection. This uses fail2ban-style logic to block IP addresses that fail SSH authentication a defined number of times within a time window. Three failed attempts within five minutes is a sensible starting point.

Default Credentials – the Non-Negotiable Baseline

Change the default admin password immediately on every device before it goes onto a network. Use a unique password per device – not a shared password across your fleet. Store credentials in a password manager, not a spreadsheet. For SSH, disable password authentication and use key-based authentication only.

Teltonika devices are indexed on Shodan with default credentials.

Automated tools actively attempt default Teltonika credentials against every device they find. If a device has left the premises with the default password, assume it has been tried. Change it before deployment, not after.

Keeping Firmware Updated

Teltonika releases firmware updates regularly, including security patches for vulnerabilities in RutOS itself and in underlying components such as OpenSSL and the Linux kernel. Enable automatic update notifications or use Teltonika RMS to manage firmware across your fleet. Always verify your security configuration after a firmware update – firewall rules and VPN configurations should be checked, as major version upgrades can reset some settings to defaults.

Teltonika RMS – Remote Management That Works With Any SIM

Understanding How RMS Connects

Teltonika Remote Management System (RMS) is a cloud-based device management platform that is fundamentally different in architecture from direct remote access. Rather than requiring an inbound connection to the router, RMS uses an outbound, persistent connection from the router to Teltonika’s RMS servers. The router initiates the connection. This is a critical architectural difference with significant security implications – it means RMS works regardless of whether all inbound traffic to the router is blocked.

The outbound connection from the router on port 15009 (or 443 as a fallback) to the RMS servers is all that is needed. You do not need to open any inbound ports to use RMS for device monitoring and management. RMS provides remote access to the router’s WebUI, SSH access, and VPN-based access to LAN devices – all proxied through the RMS cloud infrastructure, all authenticated through your RMS account credentials.

What You Can Do With RMS

  • Remotely access the router’s WebUI from any browser, with RMS handling the authentication and tunnel
  • Push firmware updates to individual devices or entire fleets, scheduled or immediate
  • Receive alerts for device offline events, signal quality degradation, and data usage thresholds
  • View real-time and historical signal quality, data usage, and device status
  • Execute custom scripts and commands via SSH through the RMS console
  • Manage device configuration profiles and push configuration changes remotely
  • Access LAN-side devices through RMS VPN tunnels
RMS credit model – what to expect.

RMS operates on a credit consumption model. Basic device monitoring (status, signal quality, offline alerts) consumes very few credits and is cost-effective even for large fleets. Extended VPN sessions and large data transfers consume more. Budget for RMS credits as an operational cost when specifying deployments that will use RMS for ongoing management.

Does RMS VPN Work With a Dynamic Public IP SIM?

Yes – and this is one of the most important points in this guide for anyone managing a mixed fleet of SIM types.

RMS VPN creates an on-demand peer-to-peer VPN tunnel, brokered through the RMS cloud infrastructure, between your management device and the Teltonika router. Because the connection is brokered rather than direct, the router’s WAN IP address is irrelevant. The router has already established its outbound connection to the RMS servers. When you initiate an RMS VPN session from the portal, the RMS infrastructure instructs the router to establish a VPN tunnel endpoint, and connects your management device to that endpoint through the cloud.

SIM Type RMS Monitoring RMS VPN Access Direct OpenVPN/WireGuard
Public IP – Static Works Works Works
Public IP – Dynamic Works Works Unreliable – IP changes
Private IP – Static Works Works Works via provider VPN
Private IP – Dynamic Works Works Not directly reachable

RMS VPN for Engineer Access

RMS VPN is well-suited to the on-demand access pattern used by field engineers and technical support teams. An engineer opens the RMS portal, locates the device, initiates a VPN session, and is connected to the router’s LAN within seconds – regardless of the router’s current WAN IP or SIM type. When the session is closed, the tunnel tears down cleanly. This sidesteps the dynamic IP problem entirely for human-initiated access.

RMS VPN for Persistent Monitoring Station Access

For monitoring stations that need continuous, always-on access to poll devices at regular intervals, RMS VPN’s on-demand model is less suitable – it is designed for human-initiated sessions, not persistent machine-to-machine tunnels. For persistent monitoring access, the options are:

  • Static public IP SIM + self-hosted VPN server on the Teltonika – clean and direct, but requires a static IP SIM.
  • Private IP SIM + provider VPN infrastructure – no exposure on the public internet at all.
  • Dynamic public IP SIM + DDNS + self-hosted VPN – workable but fragile. DDNS record must update faster than the polling interval after an IP change, which is not always guaranteed.
  • Source IP whitelisting to a LAN service – pragmatic if the monitoring station has a static IP and the polled protocol has application-layer authentication.
RMS VPN vs. self-hosted VPN – when to use each.

Use RMS VPN for engineer access, technical support sessions, and configuration changes. Use a self-hosted VPN for persistent monitoring connections and machine-to-machine tunnels. For critical infrastructure, consider both – RMS as the management and engineer access channel, a self-hosted VPN as the monitoring channel.

Using Dynamic DNS With a Dynamic Public IP SIM

If you are running a self-hosted VPN server on a Teltonika with a dynamic public IP SIM, DDNS is a practical workaround. RutOS has a built-in DDNS client under Services > Dynamic DNS supporting multiple providers including No-IP, DynDNS, and Cloudflare. The router automatically updates the DNS record when its WAN IP changes. The key limitation is the update delay – typically 60 to 300 seconds after a reconnection – during which connections will fail. Acceptable for engineer access; potentially problematic for high-frequency automated monitoring.

Setting Up Alerts and Logging

A hardened router that generates no alerts still leaves you flying blind about what is happening on the WAN interface. Configure the following as part of every deployment.

Email and SMS Alerts

Under Services > Events Reporting, configure notifications for: WAN connection state changes; login attempts to the WebUI; SSH login attempts; firewall rule triggers on specific rules; and data usage threshold breaches. Unexpected data usage spikes are often the first visible indicator of a compromised or misconfigured device – if your device normally uses 50MB per day, set an alert at 200MB.

Syslog to a Remote Server

RutOS supports forwarding system logs to a remote syslog server under System > Administration > Troubleshoot > System Log. Route Teltonika logs to a SIEM or syslog collector if one is in use. This gives you a tamper-resistant record of events, since logs stored only on the router can be cleared if the router is compromised.

RMS Monitoring and Alerts

Within the RMS portal, configure offline alerts for every managed device. An unexpected device going offline during business hours is a security-relevant event as well as an operational one. RMS alert configuration is managed centrally in the portal rather than needing to be set on each device individually.

Hardening Checklist

Use this checklist for every Teltonika deployment on a public IP SIM. It represents the minimum acceptable configuration for a device connected to operational equipment.

Baseline Security

  • Default admin password changed to a strong, unique password before deployment
  • SSH password authentication disabled; key-based authentication configured if SSH is used
  • WebUI access from WAN disabled
  • SSH access from WAN disabled
  • HTTPS enforced for WebUI (HTTP redirects to HTTPS)
  • Firmware updated to latest stable release before deployment
  • Firmware update notifications enabled or RMS firmware management configured

Firewall Configuration

  • WAN zone default input policy set to DROP
  • All unnecessary port forwarding rules removed
  • Remaining port forwarding rules reviewed, documented, and source-IP restricted
  • SYN flood protection enabled
  • Port scan protection enabled
  • SSH brute force protection enabled with conservative thresholds

Remote Access

  • OpenVPN or WireGuard server configured and tested
  • VPN port open in firewall (only VPN port – all other inbound remains dropped)
  • Individual client credentials created per user (no shared credentials)
  • VPN client list documented with name, organisation, and date of creation
  • Leavers process defined – mechanism for revoking individual client access documented
  • Monitoring station access configured via IP whitelist or persistent VPN tunnel with source restriction
  • RMS configured for device management, firmware, and engineer access

Alerting and Logging

  • Email or SMS alerts configured for device offline events
  • Data usage threshold alert configured
  • RMS offline alert configured for each device
  • Syslog forwarding configured if centralised logging is in use

Ongoing Maintenance

  • Firewall rule register reviewed every six months
  • VPN client list reviewed for leavers/changes every six months
  • Shodan check performed on device public IP at deployment and annually
  • Firmware update checked quarterly

Summary – Which Approach Is Right for You?

ScenarioRecommended Approach
Single site, existing public IP SIM, cost-sensitive Harden the Teltonika (Option 2). Set up WireGuard for engineer access, whitelist monitoring company, use RMS for management.
Fleet deployment, compliance requirement, critical infrastructure Private IP SIM (Option 1). The cost per SIM is justified by the reduction in attack surface and audit simplicity.
Dynamic public IP SIM, engineer access needed RMS VPN for engineer sessions, DDNS + OpenVPN/WireGuard for monitoring station. Do not rely on direct IP-based VPN with a dynamic SIM.
BMS or industrial controller with unauthenticated protocols (Modbus, S7) Private IP SIM or VPN-only access is mandatory. Never port-forward unauthenticated industrial protocols through a public IP router.
Mixed fleet (some static, some dynamic SIMs) RMS as the universal management layer. Add self-hosted VPN where static IP SIMs allow it. RMS VPN fills the gap for dynamic IP devices.

The underlying principle across all scenarios is the same: the public internet should never have a direct, unauthenticated path to your operational devices or to the management interfaces of the routers protecting them. Whether you achieve that through network-layer isolation (private IP SIM) or through router-level controls (hardened Teltonika with VPN), the destination is the same. The path you take is a commercial and operational decision.

If you are currently running Teltonika routers on public IP SIMs with port forwarding to LAN devices and no VPN in place, this guide describes the remediation path. The work is achievable in a few hours per site for an engineer familiar with RutOS. The alternative is leaving operational systems exposed to a threat landscape that is automated, persistent, and increasingly targeted at exactly the kind of low-visibility industrial IoT devices that populate the energy, facilities, and utilities sectors.


Further Reading – Official Teltonika Wiki References

The links below point to the official Teltonika Networks wiki. The RUT200 is used as the reference device throughout – it is one of the most widely deployed low-cost 4G routers in the UK and is frequently installed with a public static IP SIM as the path of least resistance for remote access. If you are using a different model, substitute the model prefix in the URL: RUTX11, RUT241, RUT906, RUTX50 and so on all follow the same pattern.

Why the RUT200?

The RUT200 is a compact, single-SIM LTE Cat 4 router at the affordable end of the Teltonika range. That combination – low cost, easy to source, simple to configure – makes it the go-to choice for installers who need “something to put a SIM in” for a BMS controller or energy meter. It is also, for exactly those same reasons, frequently deployed with minimal security configuration. If you or your installer used a RUT200, this guide was written with you in mind.

Firewall and Attack Prevention

RUT200 Firewall – Traffic Rules, Attack Prevention, Port Forwards

Covers setting WAN zone policies, creating traffic rules for IP whitelisting, SYN flood protection, port scan protection, SSH brute force limits, and the Attack Prevention tab. Start here for all firewall hardening steps.

wiki.teltonika-networks.com/view/RUT200_Firewall
Firewall Traffic Rules – Generic Guide (all RutOS devices)

A model-agnostic deep-dive into how RutOS traffic rules work, with practical configuration examples for blocking and allowing specific IPs and ports. Useful background reading before setting up IP whitelisting rules.

wiki.teltonika-networks.com/view/Firewall_traffic_rules

Access Control – Locking Down WebUI and SSH

RUT200 Administration – Access Control, Users, Certificates

Covers disabling WebUI and SSH access from WAN, configuring system users with restricted permissions, SSH key-based authentication, and TLS certificate management. The Access Control section is the first place to go after changing the admin password.

wiki.teltonika-networks.com/view/RUT200_Administration

VPN – OpenVPN and WireGuard Server Setup

RUT200 VPN – OpenVPN Server, WireGuard, ZeroTier

The main VPN configuration page for the RUT200. Covers OpenVPN server setup (TLS and static key modes), per-user TLS client certificates, WireGuard interface and peer configuration, and the built-in brute force blocking for OpenVPN. Primary reference for Sections 7 and 8 of this guide.

wiki.teltonika-networks.com/view/RUT200_VPN
OpenVPN Configuration Examples – Generic (all RutOS devices)

Step-by-step walkthrough of setting up an OpenVPN TLS server on one Teltonika router with a second router as the client. Useful if you are connecting two sites rather than individual engineer laptops. Covers TUN mode, UDP protocol, and TLS certificate generation.

wiki.teltonika-networks.com/view/OpenVPN_configuration_examples

Dynamic DNS – Keeping a Hostname for a Dynamic IP SIM

RUT200 Dynamic DNS – Configuration and Provider Setup

How to configure the built-in DDNS client to keep a hostname pointing at the router’s current WAN IP. Covers supported providers including Cloudflare, No-IP, and DynDNS. Essential if you are running a VPN server on a dynamic public IP SIM.

wiki.teltonika-networks.com/view/RUT200_Dynamic_DNS
Remote Device Access – Overview of All Remote Access Methods

Covers static IP, dynamic IP with DDNS, and private IP scenarios and how each maps to different remote access approaches including VPN and RMS. Good starting point if you are deciding which approach fits your SIM type.

wiki.teltonika-networks.com/view/Remote_Device_Access

Alerts and Events Reporting

RUT200 Events Reporting – Email and SMS Alerts on Trigger Events

Configuration guide for email and SMS notifications on defined events including WAN state changes, login attempts, and data usage thresholds. Note: Teltonika is replacing Events Reporting with Event Juggler in newer firmware – check which applies to your firmware version before configuring.

wiki.teltonika-networks.com/view/RUT200_Events_Reporting
RUT200 Event Juggler – Replacement for Events Reporting in Newer Firmware

The updated alerting system in current RutOS firmware, with more flexible trigger conditions and action types. If your RUT200 is on a recent firmware release, use this page rather than Events Reporting above.

wiki.teltonika-networks.com/view/RUT200_Event_Juggler

Teltonika RMS – Remote Management System

RMS Overview – What It Is and How It Works

The main RMS introduction page. Covers the outbound connection architecture (why it works with any SIM type, including dynamic public IPs and private IPs), what you can monitor and manage, and how to get started.

wiki.teltonika-networks.com/view/RMS
RMS Manual – Full Feature Reference

The complete RMS user manual index, covering device management, monitoring templates, firmware updates, configuration push, alerting, and all RMS Connect features. Bookmark this rather than searching for individual features.

wiki.teltonika-networks.com/view/RMS_Manual
RMS Remote Access – VPN and RMS Connect Tunnel Sessions

Detailed guide to RMS Connect sessions – setting up tunnels to LAN-side devices (BMS controllers, energy meters), scanning devices, assigning connection names, and reviewing access history logs. The key page for understanding how RMS VPN replaces direct port forwarding for engineer access.

wiki.teltonika-networks.com/view/RMS_Remote_Access
RMS FAQ – Common Setup and Connectivity Questions

Answers to common questions about RMS connectivity, credit consumption, device registration, and troubleshooting. Worth checking before raising a support ticket if your device is not appearing in RMS or connections are failing.

wiki.teltonika-networks.com/view/RMS_FAQ
Using a different Teltonika model?

All the RUT200 links above follow the pattern wiki.teltonika-networks.com/view/RUT200_[Topic]. To find the equivalent page for your device, replace RUT200 with your model number – for example RUTX11_Firewall, RUT241_VPN, RUT906_Administration, or RUTX50_Dynamic_DNS. The structure and menu paths are consistent across the RutOS range – only the model prefix in the URL changes.

About this guide. Written by Nick Appleby, an IoT and cellular connectivity specialist with 25 years of experience in the UK cellular and M2M sector, including as a Teltonika Diamond Partner. This guide reflects practical deployment experience across energy storage, building management, and industrial IoT applications. It is updated periodically as Teltonika firmware evolves. If you have a specific scenario not covered here, feel free to get in touch.
Disclaimer. The configuration guidance in this article is provided for informational purposes. Network and security configurations must be validated against your specific deployment requirements, the device firmware version in use, and any applicable regulatory or contractual obligations. Teltonika product names, menu paths, and feature availability may change between firmware versions. The author is not responsible for security incidents arising from reliance on this guidance without independent verification. For deployments in regulated sectors including healthcare, financial services, and critical national infrastructure, engage a qualified cybersecurity professional.
NA

Nick Appleby

25+ years in telecoms and IoT. Former founder of ProRoute, Fullband, and Westlake Connect. Currently building IoT connectivity resources and writing about how the industry actually works. On the hunt for truth and common sense.