I had the same (or similar) question, and here is my scenario:
* The RED 10 is in a remote branch office location with less-than-perfect power and networking reliability.
* The RED 10 is behind (private side of) a standard NAT/router. The NAT/router has a known public IP address.
A recent power outage and network failure lasted several days, and the RED 10 did not reconnect within the (default) 60 minute time period for Automatic Device Deauthorization, so the RED 10 was disabled until I manually reactivated it. Because power and networking are not reliable in this remote office, we are wondering whether Automatic Device Deauthorization makes sense. At the same time, we want to prevent the RED 10 from unauthorized use in case of theft, etc.
OBJECTIVE: Configure the RED 10 so that it is allowed to connect only from behind a NAT/router with a designated public IP address. If the public address is anything else, the RED 10 should be disabled (or blocked).
Is there an easy way to do this from the WebAdmin interface?