Paul,
Create a rule based identity section under access service.
Create the first rule and use a IP address based condition (I am not sure which IP address you are looking for, Client's or Device's), set the result to a DB that will not authenticate the user successfully, use the advanced options there to manipulate the ACS to DROP the request.
Note: this will get replicated to your secondary server if in replication, so you might need to use an additional ACS instance condition in the rule you created.
**Share your knowledge. It’s a way to achieve immortality.
--Dalai Lama**
Please Rate if helpful.
Regards
Ed
**Share your knowledge. It’s a way to achieve immortality.
--Dalai Lama**
Please Rate if helpful.
Regards
Ed