I've just been (successfully) trying to solve something similar.
jpteltonika gave you a great idea about a VPN service, my only problem with that is, that you don't control the endpoint (3rd party VPN service) and therefore it is not perfect from security standpoint.
In my case I had the option of running VPN Server on one of my company's servers (actually a cheap-ish Synology NAS, but it works without going too deeply into configuration) and this server is accessible on public static IP. (even if it wasn't Synology have a dynamic DNS you can use, so instead of your IP you will input something.synology.me).
Long story short - set up a OpenVPN Server on a PC/server of your choice.
Make sure the ports to this server are open and routed correctly.
Assign your specific RUT240's specific names by way of using CCD description (see OpenVPN manual) and use those to assign them specific IP addresses in tunnels.
If you can, make sure the equipment on the RUT240 LAN side has a different subnet for each RUT240. As in one device will have 192.168.2.XXX, another 192.168.3.XXX etc etc.
RUT240 will be set as clients to connect to your VPN server.
If you set your main router correctly, that it knows that subnet 192.168.2.XXX can be found via VPN server sitting at IP 10.0.0.1 for example, everyone in your company LAN will be able to access your remote devices. Also, all traffic can be routed via your local LAN, which can be good or bad, depending on what you are trying to achieve.
Having all devices present at once can have added bonus of logging and displaying data/performance figures very easily.
If you'd prefer not to have many (hundreds possibly?) clients connected to your VPN server all the time, you could set Teltonika's remote management thingy to enable/disable VPN clients, or possibly use SMS control for this.