2316

Get a Live Demo

You need to see DPS gear in action. Get a live demo with our engineers.

White Paper Series

Check out our White Paper Series!

A complete library of helpful advice and survival guides for every aspect of system monitoring and control.

DPS is here to help.

1-800-693-0351

Have a specific question? Ask our team of expert engineers and get a specific answer!

Learn the Easy Way

Sign up for the next DPS Factory Training!

DPS Factory Training

Whether you're new to our equipment or you've used it for years, DPS factory training is the best way to get more from your monitoring.

Reserve Your Seat Today

RTU Upgrades, Virtualization, and Security at a Regional Telco

By Andrew Erickson

September 23, 2025

Share: 
"Our DPS infrastructure is showing its age - about 15 years - but that's pretty impressive in the long run." - Client

That line opened a candid conversation with a regional telecom team that runs a large network of unmanned sites. Their remote monitoring gear (NetGuardian RTUs, mostly) has served them well for well over a decade, which is exactly what you want from critical infrastructure.

But longevity carries a hidden cost eventually: interfaces get clunky, firmware lags, and security practices fall behind a world that keeps changing.

I'm going to distill key points from that meeting into a practical field guide for you. You'll see what the team was experiencing, how we mapped their concerns to concrete steps, and how the core principles from my book 100% Uptime - collect broadly, distribute promptly, automate the obvious, and log/tune - translate into a modernization plan you can actually execute.

Alarm data being sent to PRISM vs Central Station

The Training & Documentation Gap

New personnel inherit "binder knowledge" - and sometimes literal binders.

Client: "I have a really old book that looks like a bunch of DOS prompts. Do you have a current PDF equivalent?"

That question pops up often when senior staff rotate and new hires arrive. Paper manuals and CLI screenshots don't onboard people well in 2025. What works better is a blended approach:

  • Short, task-focused "how-to" guides (e.g., "Add a new RTU," "Map points the right way," "Set up northbound SNMP").
  • Screen-recorded videos for common workflows you want performed consistently.
  • A structured "display map" so every site is modeled the same way and people don't have to relearn naming conventions at each location.

As I said on the call: "The goal of our modern interfaces is to be more intuitive. We made a startup guide for installation and for the basics of the interface." Documentation becomes a force multiplier when it's concise, searchable, and aligned with how your people actually work.

The G5 to G6 RTU Technology Leap (Without Ripping and Rewiring)

Modernization doesn't have to mean throwing everything out. This client team's most visible pain was the older web interface:

Andrew: "The G5 and earlier were showing their age with frames and constant recurring refreshes to show new alarms. The G6 is a big leap forward."

The practical path we recommended - especially for large footprints - is incremental adoption:

  • Standardize on G6 for new sites and spares. You gain the modern UI and current security posture without a forklift.
  • Keep wiring and I/O stable. The G6 maintains the familiar "NetGuardian DNA," so you're not rebuilding the plant just to upgrade the brain.
  • Use a repeatable profile. Configure once, then download/upload to the next site to get a head start every time.
  • Replace older units gradually. If necessary, spread your eventual RTU migration across several budget cycles.

This is classic "eat the elephant one bite at a time." You raise the floor with each new deployment while postponing costly full-site rewires until they're truly necessary.

Virtualization & Cybersecurity: IT/OT Convergence Comes Home

The clients were clear and specific during our meeting:

Client: "We'd love to virtualize. How do we keep the Linux system patched up to date?"
Client: "I'm looking for SNMPv3 support without an add‑in module."

They also flagged physical access control:

Client: "We have door readers at most offices. Are there newer technologies rather than key cards that are easily cloned?"

This is where the IT/OT hybrid reality becomes real. You want virtualization for flexibility and disaster recovery, patch management that won't brick your NMS, SNMPv3 for authenticated, encrypted telemetry, and modern badge tech so a cloned card can't walk through your front door.

On the call, we discussed our in-house work toward virtualization and our general approach to OS security updates: test, verify, then deploy deliberately. Security should never break reliability. The right process is:

  1. Pilot in the lab with representative load and integrations (SNMP, email, scripts, map view).
  2. Roll out in controlled rings (a few non-critical sites first, then progressively wider).
  3. Document the patch cadence - who does what, how often, and what rollback looks like should it be necessary.

Legacy Mitigation Beats Rip-and-Replace

Many networks run a "museum of protocols" collected over decades: serial one-offs, aging rectifiers, orphaned controllers. You can't replace it all this quarter, but you also can't leave it unmonitored.

Andrew: "If you have a big device that isn't playing nice, we can usually build a mediator to make it work on your network in 2025."
Client: "So when we have legacy copper serving equipment we can no longer get, we can reach out to you?"

Exactly. There are two proven patterns:

  • Protocol Mediator (adjacent box): Keep the big device, bridge its legacy outputs (contacts/serial/proprietary) to modern SNMPv3/REST, and normalize alarms into your master/NMS.
  • Functional Replacement (drop‑in): If the original unit is small and EOL, a purpose-built full replacement device with modern monitoring/control can be more economical than sourcing used spares.

Your goal is continuity without chaos. You maintain visibility and control now, then schedule replacements when budgets and staffing allow.

Firmware: The Hidden Tech Debt You Can Pay Down Fast

When firmware lags by years, gremlins creep in. The team admitted some units were still on very old releases. We also discussed a historical issue where network scanners could knock older devices off balance.

Client: "How often should we look at firmware updates? Are there features we should consider on the older G5s?"

My general guidance: most firmware updates add features or fix issues; security-critical ones are less frequent on stable RTUs but do exist. Don't treat firmware like "set it and forget it." Put lightweight governance around it:

  • Inventory everything. Use a script from the master to collect make/model/firmware revision across your fleet.
  • Bucket by risk. Group devices into ancient, aging, and current so you can plan upgrades sensibly.
  • Automate where safe. From the master, staged rollouts reduce hands-on effort and prevent mistakes.
  • Tie to change windows. You don't have to live on the bleeding edge, but you should schedule periodic catch‑ups.

The fastest way to cut risk is often a weekend of inventory and targeted upgrades.

Physical Access Is Security, Too

Old badges and unencrypted readers are a soft target:

Client: "A Flipper picks up the old badges instantly. I've watched it live."

Moving to encrypted credentials and readers closes an easy door for intruders. And once you refresh the readers, you can consider virtual/mobile credentials to reduce card management overhead. This isn't separate from monitoring. It's one of the four domains (security, power, environment, RF) that you should view holistically:

  • Treat door/motion as primary signals alongside temperature and voltage.
  • Add event correlation (door-open + after-hours + no work order) to trigger enriched notifications or camera presets.
  • Log access events in the same system as alarms so post‑incident review sees the whole picture.

Tie It All Back to My Four Monitoring Principles

Everything we've discussed here maps cleanly to the core practices you should expect from a modern monitoring program.

Collect alarms from all reasonable sources.

Don't stop at "major/minor." Pull discrete contacts, analogs, and protocol data (SNMP/Modbus/DNP3/TL1) into the same RTU/master. Add start‑battery analogs for generators, rectifier/battery voltage trends, temperature and airflow, door/motion, and RF forward/reflected power. Breadth turns one-line alarms into a "causal story" you can act on.

Distribute alarm detail promptly.

Route the right message to the right person at the right moment: NMS/map view for dispatch, email/SMS/mobile web for field, escalation for unacknowledged criticals. Include response instructions in the message ("If X, check Y; bring Z"). That's how you scale expertise to new team members, even when something randomly fails at 2AM on an idle Tuesday.

Program automatic responses.

Handle routine patterns in seconds instead of minutes: "AND" commercial power fail with low battery to start the generator; limit HVAC units on generator; tie comfort mode to motion and auto‑timeout. Automation doesn't replace judgment, but it buys you time to react properly.

Log & tune.

Trend HVAC cycles, airflow, start-battery curves, rectifier voltages. Prune noisy points and adjust thresholds so pages are rare and actionable. Small monthly reviews drive down OpEx and prevent the "second incident" from becoming your motivator.

A Phased Modernization Plan You Can Execute

Here's how I'd convert this conversation into action for any relatively large footprint:

Phase 0 (Now): Gain Visibility

  • Inventory every RTU's model/firmware from the master.
  • List interfaces that create daily friction (e.g., RTU web pages that require recurring refresh) and sites with the most trouble tickets.
  • Document training gaps (what a new tech can't do confidently in under 10 minutes).

Phase 1 (Next 60-90 Days): Quick Wins

  • Adopt new NetGuardians for all new sites and spares. Maintain wiring, gain a modern UI/security baseline.
  • Run targeted firmware catch‑ups on the oldest units (start with sites that see the most alarms).
  • Pick a pilot for encrypted badges at one high‑value door. Plan for mobile credentials if your policy allows it.
  • Create a 10‑point sensing template per site: commercial power, generator run/failed‑start, start‑battery analog, rectifier/battery analogs, door/motion, temperature, airflow, RF forward/reflected power. Configure once, clone everywhere.

Phase 2 (90-180 Days): Core Architecture

  • Virtualization pilot in your lab (or secondary DC) for the master - with disaster‑recovery runbooks and rollback.
  • Protocol mediation for the top one or two legacy devices that block visibility, such as older rectifiers or controllers.
  • Automation basics: implement 3-5 automation rules to test out the process flow (e.g., generator start logic, HVAC limits on generator, after‑hours door + no work order → escalation).
  • Add response instructions to your top 25 alarms so a new techs can act without guesswork.

Phase 3 (6-12 Months): Scale and Tune

  • Broaden virtualization once the pilot proves reliable.
  • Expand encrypted readers and policies beyond the pilot location.
  • Monthly "alarm hygiene" reviews (30 minutes) to prune noise, adjust thresholds, and capture new response instructions.
  • Retire or replace the worst‑offending legacy devices, now that mediated visibility gives you data to prioritize spend.

Why This Works - Even With Tight Budgets

The team on our call had to juggle all the realities you probably face: a big map, limited staffing, customer expectations, and security scrutiny. They weren't asking for a moonshot. They wanted a path that keeps the network stable while steadily improving it.

Client: "We need to onboard a new tech with study material and help them get productive."
Client: "We'd love virtualization and better patching. We also want SNMPv3, and to get away from badges that can be cloned."
Client: "How often should we look at firmware updates on the older G5s?"

Those are exactly the right questions. The answers are practical and affordable when you sequence them properly:

  • Raise the floor with each new G6 and each firmware catch-up.
  • Bridge the gaps so legacy devices keep working safely under a modern umbrella.
  • Tighten security on both network and physical access.
  • Teach the system to help you (automation, response text, maps), then keep teaching it in monthly tune‑ups.

As I like to remind my clients, the advantage of a vertically integrated manufacturer is speed:

Andrew: "The advantage of keeping engineers on site is flexibility. If we can do something that saves you time and urgency, that's good."

That flexibility matters when you hit oddball edge cases or when an audit demands a specific capability. You don't want to start from zero every time.

Don't Wait for the "Second Event"

In another conversation earlier this year, I joked about how often quotes resurface after a second outage: "We'll do a quote, and sometimes it just sits until the powers that be get a shock to the system. I once had somebody blow the dust off an eight‑year‑old quote."

You don't need a second event. If this client's situation sounds familiar - aging but reliable gear, a push toward virtualization and SNMPv3, legacy devices you can't yank tomorrow, and access control that needs a refresh - you have a clear path:

  1. Inventory, then bucket by risk.
  2. Adopt G6 incrementally and catch up the worst firmware.
  3. Pilot virtualization and define a sane patch process.
  4. Mediate legacy equipment so you're not flying blind.
  5. Encrypt badges and tune alarm workflows.
  6. Log, review, and trim noise so every alert matters.

Do that, and you'll reduce surprise outages, shorten after‑hours calls, and make onboarding smoother for the next tech. Most importantly, you'll put your team back in control.

Share: 
Andrew Erickson

Andrew Erickson

Andrew Erickson is an Application Engineer at DPS Telecom, a manufacturer of semi-custom remote alarm monitoring systems based in Fresno, California. Andrew brings more than 18 years of experience building site monitoring solutions, developing intuitive user interfaces and documentation, and opt...