L2TP/IPSec Security (Windows CE 5.0)
When using the Layer Two Tunneling Protocol (L2TP) and IP Security Protocol (IPSec), follow these security best practices:
Do not display the pre-shared key in the user interface (UI) and protect the registry version.
Use the Data Protection API (DPAPI) to prevent identity spoofing and unwanted information disclosure, as well as protect your registry from attacks. For more information, see the Protected Store topic.
See Also
L2TP/IPSec | L2TP/IPSec Registry Settings | Enhancing the Security of a Device
Send Feedback on this topic to the authors