N
TruthVerse News

Which one of the following uses the concept of a security association?

Author

Andrew Vasquez

Updated on February 18, 2026

Which one of the following uses the concept of a security association?

The concept of a security association (SA) is fundamental to IPSec. The security association is the method that IPSec uses to track all the particulars concerning a given IPSec communication session. You will need to configure SA parameters and monitor SAs on Cisco routers and the PIX Firewall.

Moreover, what is meant by security association?

A security association (SA) is the establishment of shared security attributes between two network entities to support secure communication. An SA may include attributes such as: cryptographic algorithm and mode; traffic encryption key; and parameters for the network data to be passed over the connection.

Subsequently, question is, what is a security association SA and how is it used in IPsec? An IPsec security association (SA) specifies security properties that are recognized by communicating hosts. These hosts typically require two SAs to communicate securely. A single SA protects data in one direction. The protection is either to a single host or a group (multicast) address.

Also asked, which of the following parameters are used to identify a security association?

An SA is uniquely identified by the following three items: Security Parameter Index (SPI); destination IP address; security protocol (either AH or ESP).

How are security associations formed?

Security associations are established between two hosts using either Internet Key Exchange (IKE) [RFC2409] [RFC4306] or Authenticated IP Protocol [MS-AIPS]. Once a security association is established, IPsec-encapsulated IP traffic can pass between the two endpoints.

What are the parameters of security association?

A Security Association is uniquely identified by following three items.

Security Association and Security Parameter Index

  • Security Parameter Index (SPI): IPSec Security Parameter Index (SPI) is a unique 32-bit value that identifies the SA.
  • The Security Protocol (AH or ESP)
  • Destination IP Address.

What is security association bundle explain any one way?

The term security association bundle refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services. The SAs in a bundle may terminate at different endpoints or at the same endpoints. Security associations may be combined into bundles in two ways: •

How does security association database work?

Security Association Database (SAD) is a central repository containing all of the active SAs for both inbound and outbound traffic, with each entry defining the parameters for a specific SA.

What is Internet Key Exchange protocol?

Internet Key Exchange (IKE) is the protocol used to set up a secure, authenticated communications channel between two parties. IKE typically uses X. 509 PKI certificates for authentication and the Diffie–Hellman key exchange protocol to set up a shared session secret.

What are the features of a security association select all that apply )?

A security association consists of features like traffic encryption key, cryptographic algorithm and mode, and also parameters required for the network data.

What is security policy database?

A Security Policy Database

A higher level Security Policy Database (SPD) specifies what security services are to be applied to IP packets and how. Each SPD entry is defined by a set of IP and upper-layer protocol field values, called selectors.

What encryption does IPSec use?

IP Security Protocol—Encapsulating Security Payload (ESP)

It supports a variety of symmetric encryption algorithms. The default algorithm for IPSec is 56-bit DES. This cipher must be implemented to guarantee interoperability among IPSec products. Cisco products also support use of 3DES for strong encryption.

What are the two ways of providing authentication in IPSec?

22.11 What are two ways of providing authentication in IPsec? A combined authentication/encryption function called Encapsulating Security Payload (ESP) and a key exchange function.

What is the difference between transport mode and tunnel mode?

The key difference between transport and tunnel mode is where policy is applied. In tunnel mode, the original packet is encapsulated in another IP header. In transport mode, the IP addresses in the outer header are used to determine the IPsec policy that will be applied to the packet.

What is SA on VPN?

The concept of a security association (SA) is fundamental to IPSec. An SA is a relationship between two or more entities that describes how the entities will use security services to communicate securely. IPSec provides many options for performing network encryption and authentication.

What parameters characterize the nature of a particular SA?

What parameters identify an SA and what parameters characterize the nature of a particular SA? Ans: A security association is uniquely identified by three parameters: Security Parameters Index (SPI): A bit string assigned to this SA and having local significance only.

Which of the following is a combination of security services protections and cryptographic keys mutually agreed to communicating peers?

What is a Security Association (SA)? The combination of security services, protection mechanisms and cryptographic keys mutually agreed to by communicates peers.

What are the basic approaches to bundling SAs?

What are the basic approaches to bundling SAs? no added benefit since the processing is performed at one IPsec instance: the (ultimate) destination. Iterated tunneling: Refers to the application of multiple layers of security protocols effected through IP tunneling.

What is Isakmp used for?

Internet Security Association and Key Management Protocol (ISAKMP) is used for negotiating, establishing, modification and deletion of SAs and related parameters. It defines the procedures and packet formats for peer authentication creation and management of SAs and techniques for key generation.

What is the use of IPsec?

IPsec is a group of protocols that are used together to set up encrypted connections between devices. It helps keep data sent over public networks secure. IPsec is often used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come from.

What is the difference between AH and ESP used with IPsec?

The AH protocol provides a mechanism for authentication only. The ESP protocol provides data confidentiality (encryption) and authentication (data integrity, data origin authentication, and replay protection). ESP can be used with confidentiality only, authentication only, or both confidentiality and authentication.

What is a traffic selector?

A traffic selector is an agreement between IKE peers to permit traffic through a tunnel if the traffic matches a specified pair of local and remote addresses. With this feature, you can define a traffic selector within a specific route-based VPN, which can result in multiple Phase 2 IPsec security associations (SAs).

What is SA in Cisco?

When a router running the Cisco IOS software creates an IPsec security association (SA) for a peer, resources must be allocated to maintain the SA. The SA requires both memory and several managed timers. For idle peers, these resources are wasted.

What protocol is used for setting up the administrative tunnel in IPsec?

To establish an IPsec tunnel, we use a protocol called IKE (Internet Key Exchange).

What is encapsulating security payload ESP?

Encapsulating Security Payload (ESP) is a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN). Tunnel Mode encrypts the whole packet including header info and source, and is used between networks.