Understand the real-world risks of exposing a Teltonika router on a public IP SIM – and learn exactly how to harden it.
Shodan, Censys, and a host of criminal botnets continuously scan the entire IPv4 address space – all 4.3 billion addresses – looking for open management ports. A typical Teltonika on factory defaults exposes:
Disable WAN Access to WebUI
The single biggest risk. If your router’s admin panel is reachable from the internet, every bot on the planet will attempt to log in. Even strong passwords can be bypassed through firmware vulnerabilities.
Network > Firewall > Traffic Rules
Add rule: Drop all incoming WAN traffic on port 80 and 443
Name: Block_WebUI_WAN
Direction: Input
Protocol: TCP
Destination Port: 80, 443
Action: DROPChange Default Credentials Immediately
Default credentials for Teltonika routers are widely published. Older firmware uses admin/admin01. Newer firmware generates a password from the device serial number – which is often printed on the label visible in photos of installations.
Disable or Restrict SSH Access
SSH on port 22 is the number one target for automated brute-force attacks globally. If you need SSH access, restrict it to specific source IPs only, or switch to key-based authentication and disable password login entirely.
Services > SSH
Set "Enable" to OFF, or
Set "Interface" to LAN only (not WAN)Services > SSH > Authentication Keys
Paste your public key
Then: PasswordAuthentication noDisable Unused Services (SNMP, Telnet, FTP)
Every enabled service is an attack surface. Telnet sends credentials in plaintext. SNMP v1/v2c with default community strings reveals full device configuration. Disable anything you are not actively using.
Keep Firmware Up to Date
Teltonika releases regular firmware updates that patch discovered vulnerabilities. Running outdated firmware on a public IP is particularly dangerous as exploits are sometimes published before patches are widely applied.
Enable HTTPS Only – Disable HTTP
HTTP login pages transmit credentials in plaintext. Any man-in-the-middle on the mobile network can capture them. Force HTTPS and consider changing the default port to reduce automated probe volume.
System > Administration > Access Control
HTTP: Disabled
HTTPS: Enabled
Consider changing HTTPS port from 443 to a non-standard portConfigure IP Allowlisting for Management
If you must allow WAN management access, restrict it to specific IP addresses only. This eliminates virtually all automated attack traffic since bots operate from random IPs.
Network > Firewall > Traffic Rules
Create rule allowing port 443 from [YOUR-OFFICE-IP] only
Drop all other port 443 traffic from WANEnable Login Attempt Limiting
Newer RutOS firmware includes built-in brute-force protection that temporarily blocks IPs after a set number of failed login attempts. Ensure this is active if WAN access is permitted.
Bot Traffic Data Estimator
Based on real-world honeypot and packet capture data from exposed IoT cellular connections
Teltonika Public IP Security Scanner
Only use this tool on IP addresses you own or have permission to test. Results include AI-powered remediation advice.
/* Drop all inbound management from WAN */ Rule 1: Block WebUI on WAN Name: Drop_WebUI_WAN Protocol: TCP Source: WAN (any) Destination: Device Dest Ports: 80, 443 Action: DROP Rule 2: Block SSH on WAN Name: Drop_SSH_WAN Protocol: TCP Source: WAN (any) Destination: Device Dest Ports: 22 Action: DROP Rule 3: Block SNMP on WAN Name: Drop_SNMP_WAN Protocol: UDP Source: WAN (any) Destination: Device Dest Ports: 161 Action: DROP /* Default WAN input policy */ Default input policy: DROP (Network > Firewall > General Settings)
/* SSH service configuration */ Enable: ON (LAN only) or OFF if using RMS Port: 22 -> change to 52222 or similar Interface: LAN (NOT WAN) Password Authentication: Disabled Root Login: Prohibited password (key only) /* Add your public key */ Services > SSH > Authentication Keys Paste contents of ~/.ssh/id_rsa.pub /* Generate key on your PC (PowerShell / bash) */ ssh-keygen -t ed25519 -C "teltonika-mgmt" # Paste the .pub content into the router UI
/* Admin access */
Username: admin (consider changing)
Password: Minimum 16 chars, mixed case + numbers + symbols
Example pattern: 4-word passphrase + numbers
/* Access restrictions */
HTTP: Disabled
HTTPS: Enabled
HTTPS Port: 8443 (non-standard reduces probe volume)
/* Safety */
System > Administration > Safety
Enable: ON
Attempts: 3
Timeout: 600 seconds
/* Session timeout */
Idle timeout: 300 seconds (5 minutes)/* RMS uses outbound TLS - no inbound ports required */ Enable: ON Connect: rms.teltonika-networks.com:15009 /* RMS provides */ - WebUI access through encrypted tunnel - SSH access through encrypted tunnel - Remote CLI - Device monitoring and alerts - Firmware updates - No public IP required for management /* After enabling RMS, add firewall rules */ Drop all WAN input except: - Established/related connections (default) - VPN tunnel traffic if in use All management via RMS only
/* WireGuard (recommended - simpler, faster) */ Services > VPN > WireGuard > Add Listen Port: 51820 Private Key: [auto-generated] Add Peer (your laptop/office router): Public Key: [from peer wg pubkey] Allowed IPs: 10.0.0.2/32 Endpoint: [peer public IP]:51820 Firewall: Allow UDP 51820 from WAN for VPN only All LAN device access via VPN tunnel Remove all port forward rules /* OpenVPN (more compatible with corporate firewalls) */ Services > VPN > OpenVPN Role: Server Protocol: UDP Port: 1194 Cipher: AES-256-GCM Auth: SHA256 TLS Auth: Enable (prevents DoS on VPN port)
Here is the tension that catches many deployments out. You want to lock down the router so no inbound traffic can reach it – but your monitoring platform (SCADA head-end, AMR system, CCTV control room, BMS server) needs to poll the device or receive data pushes from it on a regular basis. It cannot do that if the router drops everything inbound.
This is exactly why a public IP SIM is specified in the first place. The monitoring station needs a known, reachable address to connect to. The challenge is allowing that specific connection while blocking everything else.
The monitoring server has a fixed IP. Create a firewall rule that only allows inbound traffic on the protocol port from that specific IP. Drop everything else. Simple and highly effective when the monitoring platform has a stable static IP.
Run OpenVPN or WireGuard on the Teltonika. Each engineer, technician, or monitoring platform gets a unique certificate or key pair. Only those holding valid credentials can establish a tunnel and reach LAN devices. The monitoring server becomes a VPN peer rather than connecting directly.
Run a VPN server on a cloud instance (AWS, Azure, or a dedicated VPS). All Teltonika devices connect outbound to this hub – no public IP SIM required on the router. All monitoring traffic routes through the hub. Engineers connect to the hub to reach any device on the fleet.
Some legacy monitoring platforms cannot act as VPN peers and cannot connect via a hub. The polling software at the head-end simply dials the site IP on a specific port. In these cases, VPN is not an option and a port must remain open. The minimum mitigations are:
Need a Hardened Teltonika Configuration?
Download our complete RutOS security configuration template – covering firewall rules, SSH hardening, and RMS setup for production deployments.