Service Provider Interconnect with Non-IPsec
Table of Contents
Expand all | Collapse all
- Strata Multitenant Cloud Manager
- First Time Setup
-
- Monitor Status of Services through the ASC Support View
- Monitor Performance of Tunnel Status through the ASC Support View
- Monitor Performance of Auto Scaling through the ASC Support View
- Monitor Performance of Throughput through the ASC Support View
- Monitor Performance of the System through the ASC Support View
- View Licenses through the ASC Partner Portal
- View Status of Upgrades through the ASC Support View
- Manage Multitenant Reports
Service Provider Interconnect with Non-IPsec
Understand what is Service Provider Interconnect, how does it work and how to
configure
Service Provider Interconnect offers a non-IPsec on-ramp (Native IP ingress) that enables
Service Providers (SPs) to deliver enterprise customer traffic directly to Prisma
Access™ without relying on IPsec tunnels.By utilizing native IP forwarding, SPI
minimizes tunnel overhead, enables high-bandwidth connectivity, and maintains end-to-end
control on the SP backbone. The design ensures zero operational touchpoints on SP or
branch networks, simplifying integration while preserving network SLAs. Traffic is
routed through SP networks and Partner Interconnects with cloud providers such as GCP
and AWS into the Prisma Access compute environment, enabling unified security and
optimized performance.
SPI supports multi-tenant isolation, granular policy control, and full integration with
Prisma Access services. You can configure SPI with either Service Provider Egress or
Prisma Access Egress, depending on how you want to route outbound traffic.
SPI with Service Provider Egress
In this configuration, customer traffic enters Prisma Access through the SPI,
security controls are applied, and then sent back to the Service Provider’s network
for egress. This deployment gives the SP control over routing and policy
enforcement, allowing them to apply their own compliance and logging mechanisms
before internet breakout.
Suitable for Service Providers that want to maintain centralized control of egress
routing and security policies.
To configure SPI with Service Provider Egress, perform the following:
- Select the Egress path as Egress back to the service provider network.
- Set up Shared Interconnect on the root tenant. This interconnect will be used to egress the traffic back to the Service Provider.
- Set up Per-tenant Interconnect for each child tenant. This is used to ingress traffic from the Service provider.
- (optional) Set up VLAN Attachments for HA and redundancy.
- (optional) Set up IP Pools if not configured during shared interconnect setup.
- Copy the VLAN attachment pairing key and use it when configuring the interconnect in colocation providers such as Equinix.
- Continue with Prisma Access feature configurations.
SPI with Prisma Access Egress
In this configuration, customer traffic enters Prisma Access via SPI and exits
through Prisma Access-managed egress points. This setup simplifies operations and
leverages Prisma Access capabilities for advanced security, threat prevention, and
data protection.
Suitable for Service Providers or customers who prefer a fully cloud-delivered model
without managing egress routing.
To configure SPI with Prisma Access Egress, perform the following:
- Select the Egress path as Egress back to the service provider network.
- Set up Per-tenant Interconnect for each tenant. This is used to ingress traffic from the Service provider.
- Set up VLAN Attachments for HA and redundancy.
- Copy the VLAN attachment pairing key and use it when configuring the interconnect in colocation providers such as Equinix.
- Continue with Prisma Access feature configurations.