I had the same (or similar) question, and here is my scenario:
* The RED 10 is in a remote branch office location with less-than-perfect power and networking reliability.
* The RED 10 is behind (private side of) a standard NAT/router. The NAT/router has a known public IP address.
A recent power outage and network failure lasted several days, and the RED 10 did not reconnect within the (default) 60 minute time period for Automatic Device Deauthorization, so the RED 10 was disabled until I manually reactivated it. Because power and networking are not reliable in this remote office, we are wondering whether Automatic Device Deauthorization makes sense. At the same time, we want to prevent the RED 10 from unauthorized use in case of theft, etc.
OBJECTIVE: Configure the RED 10 so that it is allowed to connect only from behind a NAT/router with a designated public IP address. If the public address is anything else, the RED 10 should be disabled (or blocked).
Is there an easy way to do this from the WebAdmin interface?
Not without removing the current RED definition (don't forget to record the unlock code!)and creating a new RED definition with a fixed IP which must be the public IP you want to "lock" it to. This means that the RED will have that public IP on its WAN interface, and implies a change in the network topology.
Cheers - Bob
Sophos UTM Community Moderator Sophos Certified Architect - UTM Sophos Certified Engineer - XG Gold Solution Partner since 2005