Hello again Giovanni
The first setup that you mention in your post uses the IPSec Static Virtual Tunnel Interface. This is a simpler method of configuring a VPN with IPSec without using access lists. This is detailed more fully in the following lesson:
While the second set of commands involves the creation of an IPSec Tunnel Mode Configuration scenario. This is detailed in the following lesson:
Both essentially do the same thing, but the cyrpto ipsec profile
command is the newer and preferred method of implementation.
I hope this has been helpful!
Laz