If you
Configure
Authentication Policy, your firewalls must also redistribute
the
Authentication
Timestamps that are generated when users authenticate to
access applications and services. Firewalls use the timestamps to
evaluate the timeouts for Authentication policy rules. The timeouts
allow a user who successfully authenticates to later request services
and applications without authenticating again within the timeout
periods. Redistributing timestamps enables you to enforce consistent
timeouts across all the firewalls in your network.