Skip to content

Commit 72a6f9f

Browse files
Dev review
1 parent 34a159f commit 72a6f9f

File tree

2 files changed

+23
-15
lines changed

2 files changed

+23
-15
lines changed

articles/private-5g-core/complete-private-mobile-network-prerequisites.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ ms.custom: template-how-to
1414

1515
In this how-to guide, you'll carry out each of the tasks you need to complete before you can deploy a private mobile network using Azure Private 5G Core.
1616

17+
> [!TIP]
18+
> [Private mobile network design requirements](private-mobile-network-design-requirements.md) contains the full network design requirements for a customised network.
19+
1720
## Get access to Azure Private 5G Core for your Azure subscription
1821

1922
Contact your trials engineer and ask them to register your Azure subscription for access to Azure Private 5G Core. If you don't already have a trials engineer and are interested in trialing Azure Private 5G Core, contact your Microsoft account team, or express your interest through the [partner registration form](https://aka.ms/privateMECMSP).
@@ -33,15 +36,15 @@ Depending on your networking requirements (for example, if a limited set of subn
3336
### Management network
3437

3538
- Network address in Classless Inter-Domain Routing (CIDR) notation.
36-
- Default gateway.
39+
- Default gateway.
3740
- One IP address for the Azure Stack Edge Pro device's management port. You'll choose a port between 2 and 4 to use as the management port as part of [setting up your Azure Stack Edge Pro device](#order-and-set-up-your-azure-stack-edge-pro-devices).*
3841
- Six sequential IP addresses for the Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) cluster nodes.
3942
- One IP address for accessing local monitoring tools for the packet core instance.
4043

4144
### Access network
4245

43-
- Network address in CIDR notation.
44-
- Default gateway.
46+
- Network address in CIDR notation.
47+
- Default gateway.
4548
- One IP address for the control plane interface. For 5G, this interface is the N2 interface, whereas for 4G, it's the S1-MME interface.*
4649
- One IP address for the user plane interface. For 5G, this interface is the N3 interface, whereas for 4G, it's the S1-U interface.*
4750
- One IP address for port 5 on the Azure Stack Edge Pro device.

articles/private-5g-core/private-mobile-network-design-requirements.md

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: template-concept
1212

1313
# Private mobile network design requirements
1414

15-
This article helps you design and prepare for implementing a private 4G or 5G network based on the Azure Private 5G technology. It aims to provide an understanding of how these networks are constructed and the decisions that you need to make as you plan your network. It is intended for system integrators and other advanced partners that have a good understanding of enterprise IP networking and a grounding in Azure fundamentals.
15+
This article helps you design and prepare for implementing a private 4G or 5G network based on the Azure Private 5G technology. It aims to provide an understanding of how these networks are constructed and the decisions that you need to make as you plan your network.
1616

1717
## Azure Private MEC and Azure Private 5G Core
1818

@@ -43,27 +43,32 @@ In this section, we outline some decisions you should consider when designing yo
4343

4444
#### Design considerations
4545

46-
- Azure Private 5G Core Packet Core supports deployments with or without L3 routers on ports 5 and 6. This is useful for avoiding extra hardware at small Edge sites.
46+
When deployed on Azure Stack Edge (ASE), AP5GC uses physical port 5 for access signalling and data (5G N2 and N3 reference points/4G S1 and S1-U reference points) and port 6 for core data (5G N6/4G SGi reference points).
4747

48-
- It is possible to connect the N2/N3 reference points (ASE port 5) to RAN nodes directly (back-to-back) or via an L2 switch. We recommend configuring the xNodeB address as a gateway on the ASE side.
49-
- Similarly, it is possible to connect the N6 reference point (ASE port 6) to your core network via an L2 switch. We recommend setting up an application or an arbitrary address on the subnet as gateway on the ASE side.
50-
- Alternatively, you can combine these approaches. For example: using a router on N6 (ASE port 6) with a flat L2 network on N2/3 (ASE port 5). If a L3 router is present in local network topology, it will be set as the gateway in ASE configuration.
51-
- If your AP5GC Packet Core does not have NAT enabled or an L3 router on the N6 link (ASE port 6) is used, static routes to the UE IP pools via the appropriate N6 IP address for the corresponding Attached Data Network must be configured in the DN router.
52-
- Layer 2 network separation can be achieved by using VLANs. This has a few key benefits in simplifying L3 network management and improving network security via traffic isolation. VLANs can be configured on ASE port 5 and port 6 independently to separate the following traffic:
48+
Azure Private 5G Core Packet Core supports deployments with or without L3 routers on ports 5 and 6. This is useful for avoiding extra hardware at small Edge sites.
5349

54-
- N2 and N3 traffic on ASE port 5
55-
- N6 traffic for each Data Network on ASE port 6
50+
- It is possible to connect ASE port 5 to RAN nodes directly (back-to-back) or via an L2 switch. When using this topology, it is required to configure the eNodeB/gNodeB address as the default gateway in the ASE network interface configuration.
51+
- Similarly, it is possible to connect ASE port 6 to your core network via an L2 switch. When using this topology, it is required to set up an application or an arbitrary address on the subnet as gateway on the ASE side.
52+
- Alternatively, you can combine these approaches. For example: using a router on ASE port 6 with a flat L2 network on ASE port 5. If a L3 router is present in local network topology, you must set it - Alternatively, you can combine these approaches. For example: using a router on ASE port 6 with a flat L2 network on ASE port 5. If a L3 router is present in local network topology, you must set it as the gateway in ASE configuration.
53+
.
54+
55+
Unless your AP5GC Packet core is using NAT, there must be a L3 router configured with static routes to the UE IP pools via the appropriate N6 IP address for the corresponding Attached Data Network.
56+
57+
Layer 2 network separation can be achieved by using VLANs. This has a few key benefits in simplifying L3 network management and improving network security via traffic isolation. VLANs can be configured on ASE port 5 and port 6 independently to separate the following traffic:
58+
59+
- N2 and N3 traffic on ASE port 5
60+
- N6 traffic for each Data Network on ASE port 6
5661

5762
#### Sample network topologies
5863

59-
There are multiple ways to setup your network for use with AP5GC packet core. The exact setup varies depending on your own needs and hardware. This section outlines some decisions to be considered when designing a solution and provides some sample network topologies.
64+
There are multiple ways to set up your network for use with AP5GC packet core. The exact setup varies depending on your own needs and hardware. This section provides some sample network topologies.
6065

6166
- Layer 3 network with N6 Network Address Translation (NAT)
62-
The basic setup has your ASE connected to a layer 2 device that provides connectivity to the mobile network core and access gateways (routers connecting your ASE to your data and access networks respectively). This solution is commonly used as it supports L3 routing when required.
67+
Thhis network topology has your ASE connected to a layer 2 device that provides connectivity to the mobile network core and access gateways (routers connecting your ASE to your data and access networks respectively). This solution is commonly used as it supports L3 routing when required.
6368
:::image type="content" source="media/private-mobile-network-design-requirements/layer-3-network-with-n6-nat.png" alt-text="Diagram of a layer 3 network with N6 Network Address Translation (N A T)." lightbox="media/private-mobile-network-design-requirements/layer-3-network-with-n6-nat.png":::
6469

6570
- Layer 3 network without Network Address Translation (NAT)
66-
This topology is a similar solution to Layer 3 network with N6 Network Address Translation (NAT). UE IP address ranges must be configured as static routing in the DN router.
71+
This network topology is a similar solution to Layer 3 network with N6 Network Address Translation (NAT). UE IP address ranges must be configured as static routing in the DN router with the N6 NAT IP address as the next hop address.
6772
:::image type="content" source="media/private-mobile-network-design-requirements/layer-3-network-without-n6-nat.png" alt-text="Diagram of a layer 3 network without Network Address Translation (N A T)." lightbox="media/private-mobile-network-design-requirements/layer-3-network-without-n6-nat.png":::
6873

6974
- Flat layer 2 network

0 commit comments

Comments
 (0)