A. Configure a physical interface or create a loopback interface to use as the tunnel endpoint.B. Create the GRE tunnel interfaces.D. Add the tunnel subnet to the routing process so that it exchanages routing updates across that interface.F. Add GRE traffic to the crypto access-list, so that IPsec encrypts the GRE tunnel traffic