: Service Provider Interconnect with Non-IPsec
Focus
Focus

Service Provider Interconnect with Non-IPsec

Table of Contents

Service Provider Interconnect with Non-IPsec

Understand what is Service Provider Interconnect, how does it work and how to configure
Service Provider Interconnect offers a non-IPsec on-ramp (Native IP ingress) that enables Service Providers (SPs) to deliver enterprise customer traffic directly to Prisma Access™ without relying on IPsec tunnels.By utilizing native IP forwarding, SPI minimizes tunnel overhead, enables high-bandwidth connectivity, and maintains end-to-end control on the SP backbone. The design ensures zero operational touchpoints on SP or branch networks, simplifying integration while preserving network SLAs. Traffic is routed through SP networks and Partner Interconnects with cloud providers such as GCP and AWS into the Prisma Access compute environment, enabling unified security and optimized performance.
SPI supports multi-tenant isolation, granular policy control, and full integration with Prisma Access services. You can configure SPI with either Service Provider Egress or Prisma Access Egress, depending on how you want to route outbound traffic.

SPI with Service Provider Egress

In this configuration, customer traffic enters Prisma Access through the SPI, security controls are applied, and then sent back to the Service Provider’s network for egress. This deployment gives the SP control over routing and policy enforcement, allowing them to apply their own compliance and logging mechanisms before internet breakout.
Suitable for Service Providers that want to maintain centralized control of egress routing and security policies.
To configure SPI with Service Provider Egress, perform the following:
  1. Select the Egress path as Egress back to the service provider network.
  2. Set up Shared Interconnect on the root tenant. This interconnect will be used to egress the traffic back to the Service Provider.
  3. Set up Per-tenant Interconnect for each child tenant. This is used to ingress traffic from the Service provider.
  4. (optional) Set up VLAN Attachments for HA and redundancy.
  5. (optional) Set up IP Pools if not configured during shared interconnect setup.
  6. Copy the VLAN attachment pairing key and use it when configuring the interconnect in colocation providers such as Equinix.
  7. Continue with Prisma Access feature configurations.

SPI with Prisma Access Egress

In this configuration, customer traffic enters Prisma Access via SPI and exits through Prisma Access-managed egress points. This setup simplifies operations and leverages Prisma Access capabilities for advanced security, threat prevention, and data protection.
Suitable for Service Providers or customers who prefer a fully cloud-delivered model without managing egress routing.
To configure SPI with Prisma Access Egress, perform the following:
  1. Select the Egress path as Egress back to the service provider network.
  2. Set up Per-tenant Interconnect for each tenant. This is used to ingress traffic from the Service provider.
  3. Set up VLAN Attachments for HA and redundancy.
  4. Copy the VLAN attachment pairing key and use it when configuring the interconnect in colocation providers such as Equinix.
  5. Continue with Prisma Access feature configurations.