crypto isakmp profile vpn1
vrf vpn1
keyring vpn1
match identity address 172.16.1.1 255.255.255.255
crypto map crypmap 1 ipsec-isakmp
set peer 172.16.1.1
set transform-set vpn1
set isakmp-profile vpn1
match address 101
!
interface Ethernet1/2
crypto map crypmap
Which statements apply to the above configuration? (Choose two.)
A.
This configuration shows the VRF-Aware IPsec feature that is used to map the crypto
ISAKMP profile to a specific VRF.
B.
VRF and ISAKMP profiles are mutually exclusive, so the configuration is invalid.
C.
An IPsec tunnel can be mapped to a VRF instance.
D.
Peer command under the crypto map is redundant and not required.