1. Check Point R81.20 VPN Administration Guide: In the "Site-to-Site VPN" chapter, section "IKE (Internet Key Exchange) and IPsec", the documentation states, "The IKE negotiation generates the authenticated and encrypted channel, known as the IKE Security Association (SA). The IKE SA is used to securely negotiate the IPsec SAs. The IPsec SAs are used to encrypt and decrypt the data in the IPsec tunnel."
2. RFC 7296 - Internet Key Exchange Protocol Version 2 (IKEv2): Section 1.2, "The Two Phases of IKE," describes the process: "The first phase is the establishment of an IKE SA... The second phase involves using that IKE SA to negotiate security associations for other protocols, such as AH and ESP for IPsec." This foundational document clearly distinguishes the IKE SA from the subsequent IPsec SAs (referred to as Child SAs). (DOI: 10.17487/RFC7296)
3. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 8, "Security in Computer Networks," the section on IPsec and IKE explains that IKE establishes a secure channel (the IKE SA) to negotiate the parameters for the IPsec SAs that will carry the data.