ISAKMP

Internet Security Association Key Management Protocol

Security
Introduced in Rel-8
ISAKMP is a framework for establishing Security Associations (SAs) and cryptographic keys in IPsec-based secure tunnels. In 3GPP, it's used within the NDS/IP (Network Domain Security for IP) specification to secure communication between network entities, such as between eNBs and the core network over S1 and X2 interfaces.

Description

The Internet Security Association Key Management Protocol (ISAKMP) is a protocol framework defined by the IETF (RFC 2408) for establishing, negotiating, modifying, and deleting Security Associations (SAs) and corresponding cryptographic keys. A Security Association is a simplex connection that affords security services to the traffic carried on it. ISAKMP defines procedures and packet formats for authentication, key establishment, and key management. It is independent of the specific key exchange protocol, authentication method, or encryption algorithm, making it a flexible framework. In 3GPP, ISAKMP is mandated within the Network Domain Security for IP (NDS/IP) specification (TS 33.210) to secure IP-based control plane and user plane communications between network elements, particularly in the Radio Access Network (RAN) and between RAN and core network elements. For instance, it is used to secure the S1 interface between eNodeB (eNB) and Mobility Management Entity (MME)/Serving Gateway (S-GW) and the X2 interface between eNBs in LTE networks, and similarly for NG-RAN interfaces in 5G. The protocol operates in two phases: Phase 1 establishes a secure, authenticated channel (an ISAKMP SA) between two peers, which is then used to protect the negotiations in Phase 2. Phase 2 establishes SAs for other protocols, such as IPsec ESP or AH, which will be used to secure the actual user or control plane data traffic. ISAKMP packets use UDP port 500. Within NDS/IP, ISAKMP is typically used with IKEv1 or IKEv2 as the key exchange protocol to perform mutual authentication (often using pre-shared keys or certificates) and to derive the keys for the IPsec SAs.

Purpose & Motivation

ISAKMP was created to provide a standardized, scalable, and secure framework for managing Security Associations in IP networks, which is a fundamental requirement for building trusted VPNs and securing inter-node communication. Within 3GPP, the adoption of ISAKMP as part of NDS/IP was motivated by the transition to all-IP network architectures in 3GPP Release 5 and beyond. As network interfaces moved from legacy, often physically protected TDM/ATM links to packet-switched IP networks, they became vulnerable to eavesdropping, spoofing, and other IP-based attacks. The purpose of NDS/IP, and by extension ISAKMP, is to provide hop-by-hop security at the IP layer between trusted 3GPP network elements, ensuring confidentiality, integrity, and authentication of signaling and user data traversing these interfaces. This addresses the security gap created by the all-IP transformation. Prior to NDS/IP, physical security of links was often deemed sufficient. ISAKMP provides a flexible, standards-based method to automate the establishment and lifecycle management of the IPsec tunnels that protect these critical network links, reducing manual configuration and enabling dynamic peer authentication and key refresh.

Key Features

  • Framework for establishment, negotiation, modification, and deletion of Security Associations (SAs)
  • Operational independence from specific key exchange protocols, encryption, or authentication algorithms
  • Two-phase operation: Phase 1 for establishing a secure management channel (ISAKMP SA), Phase 2 for establishing protocol-specific SAs (e.g., for IPsec)
  • Support for multiple authentication methods (pre-shared keys, digital signatures, public key encryption)
  • Defines payloads and exchanges for SA attributes, proposals, and notifications
  • Uses UDP port 500 for transport, providing connectionless yet reliable delivery mechanisms

Evolution Across Releases

Rel-8 Initial

Formal inclusion and mandate of ISAKMP as part of the NDS/IP (Network Domain Security for IP) framework for securing LTE interfaces. Specified for use in protecting S1 (eNB to EPC) and X2 (inter-eNB) interfaces, primarily with IKEv1, using pre-shared keys for authentication.

Continued support and potential clarifications in NDS/IP specifications. Enhancements focused on the overall NDS/IP architecture rather than fundamental changes to ISAKMP itself.

Maintenance and ongoing application of ISAKMP for LTE interface security. Specifications may have been updated for consistency.

Support for new network features and interfaces, with ISAKMP remaining the underlying SA management framework for IPsec within NDS/IP.

Continued application in LTE and early study phases for other access types. ISAKMP's role in securing carrier IP networks for 3GPP traffic remained stable.

Maintenance phase for LTE security specifications involving ISAKMP.

Preparation for 5G security architecture; ISAKMP continued to be relevant for LTE and was considered for 5G RAN interconnection security.

5G Phase 1 standardization. While 5G introduced new security protocols and architectures (e.g., service-based architecture with TLS), ISAKMP-based NDS/IP remained applicable for securing certain inter-node interfaces, particularly in the RAN (e.g., F1, E1, Xn), often with a migration path or co-existence with newer methods.

Enhanced support for Integrated Access and Backhaul (IAB) and other advanced RAN features, where securing wireless backhaul links using IPsec (with ISAKMP/IKE) is a key consideration.

Further enhancements for 5G-Advanced, including security for non-terrestrial networks (NTN). ISAKMP/IKE may be specified as an option for securing satellite backhaul links within the 3GPP security framework.

Continued evolution of 5G-Advanced security. ISAKMP's role is well-established for specific interface protection scenarios, with potential updates to recommended algorithms or authentication methods within the NDS/IP context.

Ongoing maintenance and application of ISAKMP for legacy LTE and certain 5G RAN security contexts. Specifications ensure backward compatibility and interworking with existing network deployments.

Defining Specifications

SpecificationTitle
TS 33.210 3GPP TR 33.210