12-30-2023, 01:57 AM
Correct answers are
Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.
Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.
https://www.youtube.com/watch?v=A6UoUOsbWuk
https://www.cisco.com/c/en/us/td/docs/io...F46CFDD07B
Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.
Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.
https://www.youtube.com/watch?v=A6UoUOsbWuk
https://www.cisco.com/c/en/us/td/docs/io...F46CFDD07B