These authentication settings are used rather than the constraints and authentication settings in network policy. For VPN ...