Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
When using the Layer Two Tunneling Protocol (L2TP) and IP Security Protocol (IPSec), follow these security best practices:
Do not display the pre-shared key in the user interface (UI) and protect the registry version.
Use the Data Protection API (DPAPI) to prevent identity spoofing and unwanted information disclosure, as well as protect your registry from attacks. For more information, see the Protected Store topic.
See Also
L2TP/IPSec | L2TP/IPSec Registry Settings | Enhancing the Security of a Device
Send Feedback on this topic to the authors