Never lose access: Network failure

This is part of a three-part series on ensuring you never lose access to critical systems:

When everything is working, remote access feels solved.

You can connect over SSH, use RDP, or rely on your RMM tools to manage systems remotely. In normal conditions, these layers make infrastructure feel fully accessible from anywhere.

But all of those tools share another assumption: the system is reachable over the network.

When that assumption breaks, those tools don’t degrade gracefully — they simply become unavailable.

The system may be running perfectly — you just can’t get to it.

Key takeaways

  • Network outages can make otherwise healthy systems unreachable.
  • Remote access tools depend on network connectivity.
  • When the network fails, SSH, RDP, and agents typically stop working.
  • Recovery requires an independent path into the environment.
  • Cellular fallback provides a reliable recovery path.

When the network is unavailable

This isn’t a rare edge case. It shows up in real environments all the time — from routine issues like ISP outages or misconfigurations to larger failures that isolate entire sites.

An ISP goes down. A switch fails. A firewall rule changes. A VLAN is misconfigured and suddenly systems are cut off from the rest of the network.

In these situations, the system itself is often still running. Applications continue normally. The operating system is stable. Everything looks fine locally.

From the outside, the system is unreachable.

SSH times out. RDP won’t connect. Remote tools stop checking in. Nothing is actually broken — you just don’t have a path to it.

Where most setups fall short

Most environments are built around a single network path.

You connect over the primary LAN. Remote tools use that same network. Even out-of-band devices are often placed on that same infrastructure.

And in many cases, that works — as long as the network is functioning well enough to carry traffic.

But when that network path fails or becomes unreachable, those options disappear. Access depends on the same layer that has failed.

That’s the gap most teams don’t notice until they lose connectivity to a system that’s still running.

What works when the network is down

When the primary network path is no longer available, access depends on having an independent way into the environment.

  • Cellular connectivity
  • Secondary network paths
  • Out-of-band devices on separate interfaces

Separate path, separate failure domain.

This often means using a dedicated cellular router or modem to provide a fallback connection. In smaller setups, even a mobile device can serve as a temporary path when needed.

Systems with multiple network interfaces make this easier.

Gaps in typical environments

Some environments include network redundancy — secondary WAN links, failover routers, or backup connections. When configured correctly, these can help maintain access during outages.

But in many environments, coverage is inconsistent.

Smaller sites often rely on a single ISP. Remote locations may not have any fallback connectivity at all. Even when redundancy exists, it’s often tied to the same infrastructure — the same switch, the same power source, or the same failure domain.

Out-of-band devices are frequently connected to that same network, which means they become unreachable at the exact moment they’re needed most.

That’s what turns a routine network issue into a loss of access — or a site visit.

A more reliable approach

Teams that handle these situations more smoothly tend to take a different approach. Instead of relying on a single network path, they introduce an independent path for access.

This doesn’t replace existing infrastructure. Primary networks, VPNs, and remote access tools still handle day-to-day operations.

But alongside those systems, there is a separate path — one that remains available even when the primary network is not.

This often means a cellular fallback connection or a secondary interface that remains reachable when the primary network is down.

That separation is what keeps access available — not just during normal operation, but when the network fails.

Where TinyPilot fits

TinyPilot provides KVM over IP and serial console access that can operate across multiple network paths.

This allows you to maintain access to a system even when the primary network is unavailable — whether through a secondary interface, a separate network, or a cellular fallback connection.

Instead of relying on a single network path, you maintain a consistent way to reach systems when connectivity is disrupted.

Building a resilient access strategy

Maintaining access during a network outage comes down to one thing: having a path that doesn’t depend on the primary connection.

That usually means introducing a second way into the environment.

For many deployments, this is a cellular fallback — a dedicated LTE or 5G router that remains reachable when the primary ISP is down. In more demanding environments, managed connectivity providers can offer a more reliable, predictable path.

In smaller setups, even a mobile phone can serve as a temporary fallback when needed.

→ Use an iPhone as a Cellular Fallback Connection for your TinyPilot

These approaches work best with systems that can use multiple interfaces — whether through a secondary Ethernet connection, a separate network, or Wi-Fi as a backup.

The goal isn’t to replace your primary network. It’s to make sure there’s still a way in when it fails.


Most remote access tools work well during normal operation. The challenge is not when everything is functioning — it’s when it isn’t.

Recovery requires access that does not depend on a single network path.

Everything might be working fine — you just can’t reach it.

Remote access with TinyPilot

TinyPilot provides out-of-band access that helps ensure you never lose access to your systems — even during network outages.

Explore TinyPilot devices