You can use proxy authentication to have any traffic coming from a specified location to be given the same web permissions assigned to a user group.
- Select authentication method of "No Authentication" or "Core Authentication" in step 1.
- Select location for step 2.
- Select the assigned group in the "Options for unauthenticated requests" for step 3.
This gives the flexibility of being able to browse as a different user group, if core authentication has been selected and a login has been performed.
See our help topic, Creating Authentication Policies.