Chapter 4 Authentication : Configuring authenticated access
  
Configuring authenticated access
When you have configured authentication servers, users, and user groups, you are ready to configure security policies and certain types of VPNs to require user authentication.
This section describes:
Authentication timeout
Password policy
Authentication protocols
Authentication in security policies
VPN authentication