Fact-checked by Grok 2 weeks ago

Security association

A security association (SA) is a simplex logical connection in the Internet Protocol Security (IPsec) architecture that provides a set of services, such as , , and , to the IP traffic it carries between two communicating parties. It is unidirectional, meaning a pair of SAs is typically required for bidirectional communication, and it is identified uniquely by a combination of a 32-bit Security Parameters Index (SPI), the destination , and the protocol identifier (either Authentication Header (AH) or Encapsulating Security Payload (ESP), but not both on the same SA). SAs are established either manually or automatically, most commonly through the (IKE) protocol, and they apply consistent cryptographic processing to all traffic traversing them. In , SAs form the core mechanism for implementing security at the network layer, supporting both IPv4 and environments. Each SA specifies critical parameters stored in the Security Association Database (SAD), including cryptographic algorithms and keys for or , a sequence number counter for replay protection, an anti-replay window, and lifetime limits based on time or data volume after which the SA expires and must be renegotiated. The Database (SPD) complements the SAD by defining which traffic requires SA protection and selecting appropriate SAs based on traffic selectors like IP addresses, ports, and protocols. SAs operate in one of two modes: mode, which secures the payload of an end-to-end, or mode, which encapsulates the entire for gateway-to-gateway or host-to-gateway VPN scenarios. The establishment and management of SAs ensure scalable and secure communications, with IKE handling key negotiation and SA parameters to maintain and resist attacks. While SAs primarily support traffic, extensions allow for group , enabling applications like secure video conferencing. Overall, the SA concept abstracts the complexities of cryptographic operations, allowing implementations to provide robust protection against , tampering, and impersonation in diverse network topologies.

Fundamentals

Definition

A security association (SA) is a (unidirectional) connection between two endpoints that specifies the security parameters for protecting network traffic flowing in one direction, including mechanisms for encryption, authentication, and integrity. This construct ensures that all packets traversing the SA receive identical security treatment, implemented via either the (AH) or (ESP) protocol, but not both simultaneously. The concept of an SA was introduced as part of the IPsec protocol suite to establish a shared security context between communicating parties without requiring per-packet negotiation, thereby enabling efficient protection of IP-layer traffic. It originated in the initial IPsec architecture defined in RFC 2401 (November 1998) and was updated and refined in RFC 4301 (December 2005), which obsoletes the earlier specification to incorporate improvements in processing models and protocol integration. RFC 4301 maintains the core SA framework while enhancing support for both IPv4 and IPv6 environments. Core attributes of an SA include its uniqueness, achieved through a 32-bit Security Parameter Index (SPI) that, combined with the destination and security protocol identifier, distinguishes it from other SAs at the receiver. Due to its unidirectional nature, inbound and outbound SAs are maintained separately; bidirectional communication thus requires a pair of SAs, one for each direction. For traffic, the SPI and destination suffice for identification, whereas for SAs, the source is also required. For instance, in a (VPN) tunnel, an SA might define AES-256 in (CBC) mode for alongside HMAC-SHA-256 for , ensuring and for the protected traffic.

Key Components

A security association (SA) in consists of a set of parameters that define the security services applied to traffic between two endpoints. These components ensure , integrity, , and protection against replay attacks, with specifics varying based on the protocol used, such as (ESP) or (AH). Essential parameters include the cryptographic algorithms selected for the SA. For ESP, these encompass an encryption algorithm (e.g., AES in CBC mode), its associated symmetric key, initialization vector (IV) handling, an integrity algorithm (e.g., HMAC-SHA-256), and its key; combined-mode algorithms providing both encryption and integrity may also be specified. For AH, the parameters focus on an authentication algorithm (e.g., HMAC-SHA-1) and its symmetric key, without encryption. Keying material comprises these symmetric keys, which are established for cryptographic operations within the SA. Sequence numbers, typically a 64-bit counter (with only the low-order 32 bits transmitted in headers), provide ordering and support anti-replay mechanisms. Path MTU considerations are also included, particularly for tunnel-mode SAs, where the endpoint tracks the to avoid fragmentation issues during processing. The (SPI) is a 32-bit that uniquely identifies an for a given , appearing in the or header to map incoming packets to the correct SA parameters. The sender selects and inserts the SPI into outbound packets, while the receiver uses it for lookup and application of the associated services. Lifetime parameters govern the duration of an SA's validity, expressed as soft and hard timeouts measured in seconds or bytes processed. A soft lifetime serves as a warning threshold to initiate before expiration, while the hard lifetime enforces termination of the SA to limit exposure if rekeying is delayed. The anti-replay window prevents duplicate packet acceptance by maintaining a sliding window of recent sequence numbers, with a minimum supported size of 32 packets but a preferred default of 64 packets. This mechanism, enabled by default for with integrity protection, discards packets falling outside the window or duplicating those within it, using a bit-map to track received sequences efficiently. For instance, a typical ESP-based SA might specify in mode for with a 128-bit , for with a 256-bit , a 64-packet anti-replay window, and a lifetime of 3600 seconds (1 hour).

Role in IPsec

Integration with IPsec Protocols

IPsec employs security associations (SAs) as the fundamental building blocks to deliver services at the IP layer, primarily through the () and () protocols. provides connectionless , data origin , and optional protection against replay attacks, while offers via , along with optional and services. Each SA represents a (one-way) connection between communicating parties, identified by a Security Parameter Index (SPI), the destination , and the identifier ( or ), enabling the application of these services to specific traffic flows. In outbound traffic processing, IPsec implementations select an SA based on matching the packet against entries in the Security Policy Database (SPD), which dictates whether protection is required and specifies the applicable SA parameters such as algorithms and keys. The selected SA then guides the addition of AH or ESP headers to the packet before transmission. For inbound packets, the receiver uses the SPI from the AH or ESP header, combined with the destination and protocol, to locate the corresponding SA in the Security Association Database (SAD), after which the packet undergoes , , and validation using the SA's parameters. Security associations operate in two primary modes within : transport mode and tunnel mode. Transport mode secures only the of the , protecting upper-layer protocols between hosts without altering the original , making it suitable for end-to-end communications. In contrast, tunnel mode encapsulates the entire original within a new , securing both the and the inner header, which is typically used between security gateways for site-to-site VPNs. Both modes rely on SAs to define the security parameters applied during processing. Integration with key management protocols, such as Internet Key Exchange version 2 (IKEv2), allows SAs to be dynamically established and maintained for IPsec operations. IKEv2 creates an initial IKE SA for authentication and key derivation, followed by child SAs that directly support AH and ESP traffic protection, negotiating transforms like encryption algorithms and traffic selectors to align with IPsec policies. If no matching SA is found during inbound processing, the packet is discarded, and an auditable security event is logged, including details such as the SPI, source and destination addresses, and protocol type, to facilitate diagnostics without compromising security. Similarly, outbound packets without a policy match in the SPD result in discard, potentially triggering an ICMP error message if appropriate.

Security Association Database

The Security Association Database (SAD) serves as the primary repository in IPsec implementations for storing parameters associated with active Security Associations (SAs). It maintains a collection of entries, each corresponding to an individual SA, which defines the security processing applied to inbound and outbound traffic. These entries are essential for efficient packet handling, enabling the system to apply cryptographic protections without repeated negotiation. The structure of the SAD consists of a list of SA entries, typically indexed by the Security Parameter Index (SPI)—a 32-bit value uniquely identifying the SA—along with the destination IP address and the IPsec protocol (such as Authentication Header [AH] or Encapsulating Security Payload [ESP]). For unicast SAs, indexing relies primarily on the SPI and protocol; multicast SAs additionally incorporate source and destination IP addresses to resolve ambiguities, using a longest-match algorithm. Each entry encapsulates comprehensive SA parameters, including cryptographic keys, selected algorithms for authentication and encryption, sequence number counters (32-bit for basic sequence numbers, 64-bit for Extended Sequence Numbers), anti-replay windows (a bit-map for detecting duplicates), lifetimes (soft and hard limits based on time or byte/packet counts), IPsec protocol mode (transport or tunnel), and additional fields like Path MTU, Differentiated Services Code Point (DSCP) handling, and stateful fragment checking flags. These parameters ensure consistent security application while supporting features like replay protection and efficient key management. Operations on the SAD focus on maintaining its integrity during traffic processing. For inbound packets, the system performs a lookup using the SPI extracted from the AH or ESP header, potentially augmented by IP addresses for multicast scenarios, to retrieve the corresponding SA entry and apply decryption, authentication, or both. Insertion occurs when an SA is established, populating the entry with negotiated parameters from key management protocols; this links the SA to selectors derived from the Security Policy Database (SPD). Deletion happens automatically upon SA expiration (based on lifetime thresholds) or manually during teardown, though entries may persist briefly post-SPD updates to avoid disrupting active sessions. These operations ensure low-latency processing, with lookups designed for rapid access in high-throughput environments. The SAD interacts closely with the SPD to enforce . After an inbound packet matches an SPD entry requiring protection, the SAD is consulted using the packet's to validate and apply the ; mismatches result in discard. For outbound traffic, once the SPD selects a , the corresponding is either created (inserting a new SAD entry with selectors from the SPD and packet details) or retrieved if extant. This integration ensures -driven without redundant checks, where SAD entries may include "populate from packet" flags to refine selectors dynamically from SPD values like address ranges or port specifications. SAD entries can exist independently of the SPD for manually configured , providing flexibility in hybrid setups. In practical implementations, the SAD is maintained in kernel space for performance, allowing direct access during packet processing without user-space overhead. This kernel-level storage, part of frameworks like Linux's XFRM, minimizes latency and supports high-speed networks. To mitigate denial-of-service risks from resource exhaustion—such as excessive SA creation via flooded negotiations—implementations often enforce limits on SAD size and incorporate mechanisms like rate-limiting or cookie-based validation during SA establishment. For example, in environments, tools such as strongSwan or ipsec-tools interface with the to manage SAD entries. Administrators can view active using the ip xfrm state command from the suite, which displays details like SPIs, endpoints, algorithms, and lifetimes, aiding in and . This command-line visibility supports operational efficiency in production deployments.

Establishment and Management

Negotiation Process

The negotiation of a security association () in is primarily facilitated by the () protocol, which establishes shared security parameters and keys between peers. version 1 (), defined in RFC 2409, structures the negotiation into two phases: Phase 1 creates an for secure communication, using either Main Mode for identity protection or Aggressive Mode for faster setup at the cost of exposing identities; Phase 2 then derives child for traffic protection via Quick Mode exchanges. In contrast, version 2 (), specified in RFC 4306, streamlines this into an initial exchange for the and a subsequent create_child_SA exchange for child , reducing message overhead and improving robustness. The negotiation process begins with proposal selection, where an initiator offers multiple cryptographic algorithm proposals in an SA payload, such as combinations of encryption (e.g., ), integrity (e.g., ), and Diffie-Hellman (DH) groups (e.g., group 14 for 2048-bit MODP). The responder selects a matching proposal and notifies the initiator, ensuring both parties agree on parameters like key lengths and lifetimes; mismatched or invalid proposals result in rejection via notify payloads. Key agreement follows using Diffie-Hellman exchange payloads (KE) to compute a without transmitting it directly, combined with nonce payloads () to ensure uniqueness and prevent replay attacks. Authentication occurs subsequently, employing pre-shared keys, digital certificates (e.g., ), or (EAP) methods to verify peer identities, with the IKE SA providing confidentiality for this step in protected modes. Error handling during negotiation includes immediate rejection for unacceptable proposals or authentication failures, often via delete payloads or error notifications. IKEv2 enhances denial-of-service (DoS) resistance by introducing cookie mechanisms in the initial exchange, where responders challenge unauthenticated initiators with cookies to filter resource-intensive requests. Once completed, the resulting SAs—distinguishing between IKE SAs for management and child SAs for data protection—are ready for use in securing traffic.

Lifetime and Rekeying

Security associations (SAs) in are designed with finite lifetimes to limit the exposure of cryptographic keys and prevent long-term vulnerabilities from key reuse or algorithm weaknesses. These lifetimes can be time-based, measured in seconds or hours, or byte-based, counting the volume of traffic processed, such as octets encrypted or authenticated, including bytes. For instance, a common time-based limit is 8 hours for child SAs, while byte-based limits are configurable based on local policy. Each enforces its own local policy for these limits, as lifetimes are not negotiated during SA establishment but are configured independently to maintain consistency. To facilitate smooth transitions, SAs incorporate soft and hard lifetime s. The soft lifetime serves as a warning , prompting the system to initiate —such as notifying the daemon—before the limit is reached, allowing proactive replacement without disruption. In contrast, the hard lifetime enforces expiration, after which the SA is deleted and no further traffic processing occurs, ensuring keys are not overused. This dual mechanism balances security and operational continuity, with recommended soft lifetimes slightly shorter than hard ones, such as 5-10 minutes for testing scenarios. Rekeying refreshes SA keys while minimizing downtime, primarily through the CREATE_CHILD_SA exchange in IKEv2, which generates a new SA with fresh keys derived from nonces and optionally a Diffie-Hellman exchange for perfect (PFS). This process allows the new SA to be installed before the old one expires, enabling seamless traffic handover without interruption. For IKE SAs, rekeying resets message ID counters and mandates a Diffie-Hellman exchange for PFS, while child SAs may optionally include it; simultaneous rekeying attempts from both ends are resolved by comparing nonces, with the lower nonce prevailing to avoid conflicts. SA deletion occurs either automatically upon hard lifetime expiry or explicitly via DELETE payloads in an INFORMATIONAL exchange, which signals the peer to terminate specific and frees associated resources like cryptographic state. Deleting an IKE SA also cascades to terminate all its child . Best practices include applying to lifetime timers—randomizing expiry slightly—to prevent synchronization attacks where multiple SAs expire concurrently, and monitoring for early expiry to detect issues like . Additionally, implementations should support idle timeouts, such as 15 minutes, to clean up dormant SAs efficiently. Enhancements in RFC 7296 (2014), which updates IKEv2, improve efficiency by clarifying separation of rekeying from reauthentication, allowing more frequent key updates without full peer re-verification, and refining handling of multiple proposals for better flexibility in SA renewal. These updates build on earlier specifications like RFC 5996 (2010), emphasizing robust generation and configurable Diffie-Hellman parameters to enhance during the rekeying process.

Types and Variations

IKE Security Associations

An IKE Security Association (IKE SA) is a control-plane security association established by the Internet Key Exchange version 2 (IKEv2) protocol to perform mutual authentication between two parties and maintain shared secret information. Its primary purpose is to create a secure, authenticated channel that facilitates the efficient negotiation and establishment of subsequent IPsec Security Associations (SAs) for protocols like Encapsulating Security Payload (ESP) or Authentication Header (AH). The IKE SA is inherently bidirectional, but it operates through paired unidirectional SAs, each utilizing distinct Security Parameter Indexes (SPIs) and direction-specific keys, such as SK_ai/SK_ei for the initiator and SK_ar/SK_er for the responder. IKE SAs incorporate higher-level cryptographic parameters tailored for and message protection, distinct from those used in data-plane SAs. These include a Pseudo-Random Function (PRF) for key derivation, such as PRF_HMAC_SHA1 or AES-CMAC-PRF-128; integrity algorithms like AUTH_HMAC_SHA1_96 for protecting IKE messages; and algorithms such as ENCR_AES_CBC for . Diffie-Hellman groups are also negotiated to enable ephemeral key exchange. A single IKE SA can support multiple child SAs, allowing it to manage diverse traffic selectors without repeated full negotiations. The establishment of an IKE SA occurs through IKEv2's initial exchange, comprising two phases: IKE_SA_INIT and IKE_AUTH. In the IKE_SA_INIT phase, the first two messages negotiate the IKE SA's security parameters, exchange nonces to prevent replay attacks, and share Diffie-Hellman public values to compute shared secrets. The subsequent IKE_AUTH phase, via the next two messages, transmits peer identities, authenticates them using pre-shared keys, certificates, or other methods, and optionally establishes the first child SA for or traffic protection. One key advantage of IKE SAs is the reduction of negotiation overhead for multiple child SAs, as they provide a persistent for or adding new associations, which supports features like peer and re-authentication without disrupting ongoing sessions. For instance, in a remote access VPN scenario, an IKE SA might use certificate-based to bootstrap multiple child SAs, enabling a mobile endpoint to securely data traffic to a corporate network. In IKEv1, the equivalent to an IKE SA is the ISAKMP SA established during Phase 1, which serves a similar role in and (see Establishment and Management section for details).

IPsec Child Security Associations

In , security associations (SAs) are the data-plane associations responsible for applying security services such as and to protect actual user traffic flows. In the context of IKEv2, these are specifically termed child security associations (Child SAs). They operate using either the or protocols, but not both simultaneously within a single SA, and they form simplex connections requiring pairs for bidirectional communication. While manual establishment of SAs is possible without IKE (as described in the Fundamentals section), Child SAs refer to those automatically created and managed under an IKE SA. Multiple Child SAs can handle distinct traffic flows, such as one for IPv4 traffic and another for , based on policy requirements defined in the Security Policy Database (SPD). In IKEv2, Child SAs are created through exchanges that negotiate specific parameters while inheriting foundational keying material from the parent IKE SA, using the CREATE_CHILD_SA . Keying material is generated as a pseudorandom (prf+) of the IKE SA's SK_d combined with nonces and potentially a new Diffie-Hellman value, allowing for tailored negotiation of algorithms and groups per Child SA. A single such exchange can establish multiple Child SAs, each linked to the IKE SA for ongoing management. In IKEv1, the equivalent IPsec SAs (Phase 2 SAs) are established via Quick Mode, a three-message exchange that derives keys using the Phase 1 SKEYID values and optional Diffie-Hellman exchanges, with all payloads except the header encrypted under the ISAKMP SA. Traffic selectors define the scope of traffic protected by an SA, specifying elements like source and destination IP address ranges, next-layer protocols, and ports (or ICMP types). In IKEv1, these are conveyed via IDci and IDcr payloads during Quick Mode, identifying client subnets or hosts if proxy negotiation is used; in IKEv2, dedicated Traffic Selector (TSi/TSr) payloads provide this information, with the responder able to narrow but not expand the proposed ranges. If an incoming packet's selectors do not match an existing Child SA, the system may trigger re-negotiation to create a new SA aligned with the SPD, such as by sending an INVALID_SELECTORS notification in IKEv2 to prompt adjustment. Variations in Child SAs include support for transport or tunnel modes, with the latter encapsulating the original for gateway-to-gateway protection. While bundling multiple Child SAs under one IKE SA is common for efficiency, combining AH and ESP functionalities within a single SA is not supported, though separate AH and ESP Child SAs can be negotiated, including via a single in IKEv2, for layered protection if required— a that is rare in practice due to complexity. For instance, in a site-to-site VPN , a Child SA might secure outbound traffic from the 192.168.1.0/24 internal to a remote site using ESP in tunnel mode, applying encryption and HMAC-SHA as negotiated.

Applications and Extensions

Use in VPNs

In site-to-site virtual private networks (VPNs), security associations (SAs) establish encrypted tunnels between gateways, enabling secure connectivity between remote networks over public infrastructures such as the . These SAs, typically negotiated via the (IKE) protocol in IPsec implementations, define the cryptographic parameters for protecting traffic, allowing organizations to link branch offices to headquarters transparently. For example, configurations often employ IPsec over (GRE) to support multicast routing and dynamic protocols like OSPF within the tunnel, enhancing flexibility for enterprise connectivity. Multiple SAs provide redundancy, as seen in deployments with dual tunnels for , ensuring continuous operation if one path fails. Remote access VPNs utilize to create secure client-to-gateway connections, integrating user authentication through mechanisms like certificates or (EAP) methods to verify identity before granting access. Upon user initiation, dynamically establishes child for the session, tailoring and protections to the specific connection and enabling features like for selective traffic routing. This approach supports mobile workers by allowing on-demand SA creation without static provisioning, facilitating secure access from diverse endpoints. SA processing introduces performance overhead in VPNs, including added latency typically on the order of 10-100 microseconds per packet with , or up to a few milliseconds without, from and operations, which can impact real-time applications without . Enterprise setups scale to thousands of SAs by leveraging load-balanced gateways and high-availability clustering, as in solutions handling up to 1,000 tunnels per device at 40 Gbps throughput with minimal disruption during expansion. Cisco AnyConnect exemplifies SA usage in remote access VPNs, employing IPsec SAs over IKEv2 to deliver encrypted tunnels for secure , combining ease of deployment with robust protection for distributed teams. By enforcing through , via message authentication, and replay protection with sequence numbers, SAs in VPNs mitigate risks of , tampering, and unauthorized replays on untrusted networks.

Extensions in Modern Protocols

Modern protocols have extended the concept of security associations (SAs) beyond traditional frameworks to address emerging needs in performance, quantum resistance, and resource-constrained environments. These extensions integrate SA principles with simplified , integrated transport security, and optimized architectures for diverse applications such as VPN alternatives, web transport, and mobile networks. WireGuard, introduced in 2016 and integrated into the in 2020, represents a streamlined evolution of SA usage by employing static SAs tied to public keys in a cryptokey , eliminating the dynamic negotiation overhead of . It leverages the protocol framework's IK pattern for a single round-trip (1-RTT) using for ECDH and for , providing perfect while simplifying through pre-shared static keys. This approach reduces the complexity of traditional SAs, with the entire implementation under 4,000 lines of code, enhancing deployability in modern VPN scenarios. In and TLS 1.3, as standardized for in 9000 (2021), SAs are adapted through integrated cryptographic contexts where TLS derives packet protection keys and initialization vectors (e.g., via HKDF-Expand-Label with labels like "quic key") to secure QUIC's UDP-based streams. The 0-RTT resumption feature, enabled by pre-shared keys from prior sessions, allows immediate data transmission during resumption, reducing SA negotiation latency to zero round trips while maintaining TLS 1.3's and guarantees. This extension mitigates and supports connection migration, with replay risks addressed at the per 8470. Post-quantum cryptography updates to SA algorithms focus on quantum-resistant key exchanges within . RFC 8784 (2020) extends IKEv2 by mixing post-quantum preshared keys (PPKs) into key derivations like SK_d using PRF+, requiring at least 256 bits of for quantum and enabling incremental adoption via notifications such as USE_PPK. For lattice-based methods, draft-ietf-ipsecme-ikev2-mlkem (2025) specifies hybrid key exchange with ML-KEM (formerly CRYSTALS-Kyber) alongside classical Diffie-Hellman in IKEv2, allowing SAs to resist quantum attacks like on ECDH. These updates ensure long-term protection for SAs without full protocol overhauls. In and contexts, standards introduce lightweight optimized for low-power devices through the security architecture in TS 33.501, featuring shorter key lifetimes and reduced signaling overhead to minimize computational demands. For instance, 5G's authentication and key agreement () derives session keys with ephemeral lifetimes suited to battery-constrained IoT, integrating with non-standalone NR for efficient protection of control and user plane data. Release 17's enhancements further tailor SAs for reduced capability devices, supporting lower peak rates and half-duplex operations while preserving core security properties like . Despite these advances, extensions introduce challenges such as interoperability issues in hybrid environments combining with TLS, where mismatched parameters or protocol versions can disrupt establishment across diverse networks.

References

  1. [1]
  2. [2]
  3. [3]
  4. [4]
  5. [5]
  6. [6]
  7. [7]
  8. [8]
  9. [9]
  10. [10]
  11. [11]
  12. [12]
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
  18. [18]
  19. [19]
    RFC 4301 - Security Architecture for the Internet Protocol
    This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.
  20. [20]
    RFC 4302: IP Authentication Header
    ### Summary of AH Parameters in Security Association (RFC 4302)
  21. [21]
  22. [22]
    RFC 7296 - Internet Key Exchange Protocol Version 2 (IKEv2)
    This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication.
  23. [23]
  24. [24]
  25. [25]
  26. [26]
  27. [27]
    Chapter 7. Setting up an IPsec VPN - Red Hat Documentation
    The IPsec protocol is implemented by the Linux kernel, and Libreswan configures the kernel to add and remove VPN tunnel configurations. The IKE protocol uses ...
  28. [28]
    [PDF] Guide to IPsec VPNs - NIST Technical Series Publications
    Jun 1, 2020 · NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems ...
  29. [29]
    Introduction to strongSwan
    On Linux, the iproute2 package provides the ip xfrm state and ip xfrm policy commands to request detailed information about the IPsec SAs and policies ...Introduction To Strongswan · Ike And Ipsec Basics · Pki
  30. [30]
    ip-xfrm(8) - Linux manual page - man7.org
    This page is part of the iproute2 (utilities for controlling TCP/IP networking and traffic) project. Information about the project can be found at
  31. [31]
    RFC 2401: Security Architecture for the Internet Protocol
    The concept of a "Security Association" (SA) is fundamental to IPsec. Both ... (b) There SHOULD be two kinds of lifetime -- a soft lifetime which warns ...
  32. [32]
    RFC 7296: Internet Key Exchange Protocol Version 2 (IKEv2)
    Below is a merged summary of the IKE Security Association (IKE SA) from RFC 7296 (Sections 1, 2, 3) that retains all information from the provided segments. To ensure a dense and comprehensive representation, I’ve organized key details into tables where appropriate, while maintaining a narrative structure for the overview, phases, and usage. All quotes and specific details are preserved, and URLs are consolidated at the end.
  33. [33]
  34. [34]
  35. [35]
  36. [36]
  37. [37]
  38. [38]
  39. [39]
  40. [40]
    Requirements for an AWS Site-to-Site VPN customer gateway device
    Each VPN connection consists of two separate tunnels. Each tunnel contains an IKE security association, an IPsec security association, and a BGP peering. You ...
  41. [41]
    Cisco Secure Firewall ASA Series VPN CLI Configuration Guide, 9.18
    Jan 11, 2023 · Overview of Remote Access IPsec VPNs. Remote access VPNs allow users to connect to a central site through a secure connection over a TCP/IP ...
  42. [42]
    PIPSEA: A Practical IPsec Gateway on Embedded APUs
    With three CPU cores and one GPU in the APU, the IPsec gateway achieves a throughput of 10.36 Gbps with an average latency of 2.79 ms to perform AES-CBC+HMAC- ...
  43. [43]
    [PDF] Scale-Out IPsec Solution for Enterprises - Juniper Networks
    May 26, 2025 · When an IPsec tunnel is established on the left side (remote site to SRX), it negotiates (as part of the IPsec Security Association) an inner IP.
  44. [44]
    AnyConnect Over IKEv2 to ASA with AAA and Certificate ... - Cisco
    Jun 10, 2014 · This document describes how to connect a PC to a Cisco Adaptive Security Appliance (ASA) with the use of AnyConnect IPsec (IKEv2) as well as certificate and ...
  45. [45]
    [PDF] Next Generation Kernel Network Tunnel - WireGuard
    WireGuard is a secure network tunnel, operating at layer 3, implemented as a kernel virtual network ... The Noise Protocol Framework. 2016. url: http ...
  46. [46]
    RFC 9001 - Using TLS to Secure QUIC - IETF Datatracker
    This document describes how QUIC [QUIC-TRANSPORT] is secured using TLS [TLS13]. TLS 1.3 provides critical latency improvements for connection establishment ...
  47. [47]
    RFC 9000 - QUIC: A UDP-Based Multiplexed and Secure Transport
    QUIC is a secure general-purpose transport protocol. This document defines version 1 of QUIC, which conforms to the version-independent properties of QUIC.Missing: associations | Show results with:associations
  48. [48]
    draft-ietf-ipsecme-ikev2-mlkem-03 - Post-quantum Hybrid Key ...
    Post-quantum Hybrid Key Exchange with ML-KEM in the Internet Key Exchange Protocol Version 2 (IKEv2)