Whenever router R1 needs to construct an IPsec datagram for forwarding over
this SA, it accesses this state information to determine how it should authenticate
and encrypt the datagram. Similarly, router R2 will maintain the same state information
for this SA and will use this information to authenticate and decrypt any
IPsec datagram that arrives from the SA.