When sufficient hardware resources are not available, the security associations are not offloaded and are handled in software ...