access-list 100 permit gre host 209.169.201.1 host 209.169.201.6
crypto isakmp policy 5
authentication pre-share
hash sha256
encryption aes
group 14
crypto isakmp key D@t@c3nt3r address 209.165.201.6
crypto ipsec transform-set My_Set esp-aes esp-sha-hmac
mode transport
crypto map MAP 10 ipsec-isakmp
set peer 209.165.201.6
set transform-set My_Set
match address 100
interface GigabitEthernet0/0
description outside_interface
no switchport
ip address 209.165.201.1 255.255.255.252
crypto map MAP
interface Tunnel100
ip address 192.168.100.1 255.255.255.0
ip mtu 1400
tunnel source GigabitEthernet0/0
tunnel destination 209.165.201.6
ip route 10.20.0.0 255.255.255.0 192.168.100.2 Tunnel100
access-list 100 permit gre host 209.169.201.6 host 209.169.201.1
crypto isakmp policy 5
authentication pre-share
hash sha256
encryption aes
group 14
crypto isakmp key D@t@c3nt3 address 209.165.201.6
crypto ipsec transform-set My_Set esp-aes esp-sha-hmac
mode transport
crypto map MAP 10 ipsec-isakmp
set peer 209.165.201.1
set transform-set My_Set
match address 100
interface GigabitEthernet0/1
description outside_interface
no switchport
ip address 209.165.201.6 255.255.255.252
crypto map MAP
interface Tunnel100
ip address 192.168.100.2 255.255.255.0
ip mtu 1400
tunnel source GigabitEthernet0/1
tunnel destination 209.165.201.1
ip route 10.10.0.0 255.255.255.0 192.168.100.1 Tunnel100
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
A.
Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.
B.
Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.
C.
Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.
D.
Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.
E.
Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.