Compartilhar via


L2TP/IPSec Registry Settings (Windows CE 5.0)

Send Feedback

You can use the registry to configure some of the IP Security Protocol (IPSec) parameters used by Layer Two Tunneling Protocol (L2TP).

Note   The default registry values vary depending on which Catalog items are included in your OS design. For more information, see Default Registry Settings.

To configure the encryption options for IPSec, set the value of type REG_DWORD for the HKEY_LOCAL_MACHINE\Comm\L2TP1\Parms\IpSecEncryption key. The following table shows the possible values of this key.

Value Description
1 Request no encryption. A NULL-encryption Encapsulating Security Payloads (ESP) is negotiated.
2 Request encryption, but a connection will be established without encryption.
3 Require high or low-strength encryption. This is the default setting.
4 Require low-strength encryption. 3DES and DH 2048 are both disabled.
5 Require maximum-strength encryption. DES and DH 768 are both disabled.

If this registry value is not set, the default is 3. This is appropriate for most connections.

To disable IPSec, set the value for **HKEY_LOCAL_MACHINE\Comm\L2TP1\Parms\UseIpSec****of type REG_DWORD to 0.

**Note   **You should only disable IPSec for troubleshooting purposes. Setting the UseIpSec key to 0 requires corresponding settings on the server.

See Also

L2TP/IPSec

Send Feedback on this topic to the authors

Feedback FAQs

© 2006 Microsoft Corporation. All rights reserved.