We've actually implemented a similar approach with a few of our clients at Network Computer Pros, and it's been a solid addition to their layered security model. Routing traffic based on IP can absolutely reduce bot login attempts, especially when the technician/admin panel is consistently being targeted. For one setup, we limited the admin login interface to a defined internal IP block and redirected all other traffic straight to the client-facing portal. This minimized confusion for users and locked down the backend significantly.
I’d echo the benefits of pairing that setup with a good WAF, especially when using Cloudflare. It’s not a silver bullet, but when used properly blocking bad ASNs, enabling rate limits, and tightening geo-access, you really cut down on noise.
That said, you're right to weigh the trade-offs. IP-based rules can be brittle, especially in dynamic IP environments or with remote staff. In those cases, we’ve recommended implementing VPN access or zero-trust gateways to preserve usability without sacrificing too much security.
Always appreciate these conversations lots of good perspectives here.