1. Check Point Official Documentation: Check Point Security Gateway and Management R81.x Administration Guides > VPN R81 Administration Guide, Chapter 1: VPN Introduction, Section: "IKE (Internet Key Exchange)". The documentation states, "IKE authenticates the IPsec peers and generates the shared secret keys that IPsec uses to encrypt and decrypt data." Shared keys for encryption/decryption are symmetric.
2. IETF Standard: RFC 7296: Internet Key Exchange Protocol Version 2 (IKEv2), Section 1: Introduction. It details that IKE's function is to establish SAs and that "A keying material is generated as part of the IKE SA establishment and is used to derive keys for the IPsec SAs." The keys for IPsec (ESP/AH) are symmetric.
3. University Courseware: MIT OpenCourseWare, 6.857 Computer and Network Security, Fall 2017, Lecture 15 Notes: "Network Security / IPsec". The notes explain that IKE uses Diffie-Hellman to establish a shared secret, which is then used to derive symmetric keys for the IPsec protocols (ESP and AH).