Chapter 3 Authentication for FortiOS 5.0 : Configuring authenticated access
  
Configuring authenticated access
When you have configured authentication servers, users, and user groups, you are ready to configure security policies and certain types of VPNs to require user authentication.
This section describes:
Authentication timeout
Password policy
Authentication protocols
Authentication in security policies
Limited access for unauthenticated users
VPN authentication