Which statements apply to the above configuration?

crypto isakmp profile vpn1
vrf vpn1
keyring vpn1
match identity address 172.16.1.1 255.255.255.255
crypto map crypmap 1 ipsec-isakmp
set peer 172.16.1.1
set transform-set vpn1
set isakmp-profile vpn1
match address 101
!
interface Ethernet1/2
crypto map crypmap
Which statements apply to the above configuration? (Choose two.)

crypto isakmp profile vpn1
vrf vpn1
keyring vpn1
match identity address 172.16.1.1 255.255.255.255
crypto map crypmap 1 ipsec-isakmp
set peer 172.16.1.1
set transform-set vpn1
set isakmp-profile vpn1
match address 101
!
interface Ethernet1/2
crypto map crypmap
Which statements apply to the above configuration? (Choose two.)

A.
This configuration shows the VRF-Aware IPsec feature that is used to map the crypto
ISAKMP profile to a specific VRF.

B.
VRF and ISAKMP profiles are mutually exclusive, so the configuration is invalid.

C.
An IPsec tunnel can be mapped to a VRF instance.

D.
Peer command under the crypto map is redundant and not required.



Leave a Reply 0

Your email address will not be published. Required fields are marked *