it's going to depend on what you mean exactly by remote commands, authentication method and questions such as : is your range of IPs going to be managed and static?
it would seem simpler to set up a user with the appropriate permissions and only use that to authenticate from the desired machines, this way if the IP addresses of the client machines change the solution still works?
then you will just need a second user with whatever lower permissions are required on other machines
for example if you want to have read access for most people but some machines need to play with ddl:
log in from 127.0.0.2 with a user named REMOTE_POWERS which has the ddl admin role in that database
all other machines log in to the instance as the user RO_PEON with a role such as data reader