1. Fortinet FortiOS 7.0 Administration Guide:
In the "IPsec VPN concepts > IKE and IPsec > Phase 1 and Phase 2" section
it states: "The IKE SA is a bidirectional secure channel... The purpose of IKE phase 2 is to negotiate IPsec SAs to set up the IPsec tunnel. The IPsec SAs are unidirectional... The IPsec SAs handle the encryption and decryption of traffic in the IPsec tunnel." This supports options A and C.
In the "IPsec VPN concepts > IKE and IPsec > Phase 2 settings" section
it details lifetime settings: "You can define the SA lifetime in seconds
in kilobytes of data processed
or both. The SA expires when one of these values is reached." This supports option D and refutes B.
2. RFC 4301
Security Architecture for the Internet Protocol:
Section 4.1
"Security Associations": "An SA is unidirectional. That is
it is a security relationship that applies to traffic in one direction... For peer-to-peer communication
two SAs are required
one in each direction." This confirms the unidirectional nature of IPsec (Phase 2) SAs
supporting option C and refuting E.
3. RFC 7296
Internet Key Exchange Protocol Version 2 (IKEv2):
Section 1.2
"The IKESA": "An IKESA is a bidirectional entity that is created as the result of an IKESAINIT exchange... All IKE messages are protected by an IKESA." This confirms the bidirectional nature of the IKE (Phase 1) SA
supporting option C.