Skip to content

Commit 79f869e

Browse files
Merge pull request #220192 from b-branco/release-2211
Packet core release 2211
2 parents 86e3743 + 9b20634 commit 79f869e

30 files changed

+309
-88
lines changed

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,13 @@ Collect all the values in the following table to define the packet core instance
5555

5656
## Collect data network values
5757

58-
Collect all the values in the following table to define the packet core instance's connection to the data network over the user plane interface.
58+
You can configure up to three data networks per site. During site creation, you'll be able to choose whether to attach an existing data network or create a new one.
59+
60+
For each data network that you want to configure, collect all the values in the following table. These values define the packet core instance's connection to the data network over the user plane interface, so you need to collect them whether you're creating the data network or using an existing one.
5961

6062
|Value |Field name in Azure portal |
6163
|---------|---------|
62-
| The name of the data network. |**Data network name**|
64+
| The name of the data network. This could be an existing data network or a new one you'll create during packet core configuration. |**Data network name**|
6365
| The virtual network name on port 6 on your Azure Stack Edge Pro device corresponding to the user plane interface on the data network. For 5G, this interface is the N6 interface; for 4G, it's the SGi interface. | **ASE N6 virtual subnet** (for 5G) or **ASE SGi virtual subnet** (for 4G). |
6466
| The network address of the subnet from which dynamic IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You won't need this address if you don't want to support dynamic IP address allocation for this site. You identified this in [Allocate user equipment (UE) IP address pools](complete-private-mobile-network-prerequisites.md#allocate-user-equipment-ue-ip-address-pools). The following example shows the network address format. </br></br>`192.0.2.0/24` </br></br>Note that the UE subnets aren't related to the access subnet. |**Dynamic UE IP pool prefixes**|
6567
| The network address of the subnet from which static IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You won't need this address if you don't want to support static IP address allocation for this site. You identified this in [Allocate user equipment (UE) IP address pools](complete-private-mobile-network-prerequisites.md#allocate-user-equipment-ue-ip-address-pools). The following example shows the network address format. </br></br>`203.0.113.0/24` </br></br>Note that the UE subnets aren't related to the access subnet. |**Static UE IP pool prefixes**|

articles/private-5g-core/collect-required-information-for-sim-policy.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,14 @@ Collect each of the values in the table below for your SIM policy.
3939
| The subscriber profile ID for RAT/Frequency Priority ID (RFSP ID) for this SIM policy, as defined in TS 36.413. If you want to set an RFSP ID, you must specify an integer between 1 and 256. | **RFSP index** |No. Defaults to no value.|
4040

4141
## Collect information for the network scope
42+
4243
Within each SIM policy, you'll have a *network scope*. The network scope represents the data network to which SIMs assigned to the SIM policy will have access. It allows you to define the QoS policy settings used for the default QoS flow for PDU sessions involving these SIMs. These settings include the session aggregated maximum bit rate (Session-AMBR), 5G QoS identifier (5QI) or QoS class identifier (QCI) value, and Allocation and Retention Policy (ARP) priority level. You can also determine the services that will be offered to SIMs.
4344

4445
Collect each of the values in the table below for the network scope.
4546

4647
| Value | Azure portal field name | Included in example ARM template |
4748
|--|--|--|
48-
|The Data Network Name (DNN) of the data network. The DNN must match the one you used when creating the private mobile network. | **Data network** | Yes |
49+
|The name of the data network. This must match the name you used when creating the data network. | **Data network** | Yes |
4950
|The names of the services permitted on the data network. You must have already configured your chosen services. For more information on services, see [Policy control](policy-control.md). | **Service configuration** | No. The SIM policy will only use the service you configure using the same template. |
5051
|The maximum bitrate for traffic traveling away from UEs across all non-GBR QoS flows or EPS bearers of a given PDU session or PDN connection. The bitrate must be given in the following form: `<Quantity>` `<Unit>` </br></br>`<Unit>` must be one of the following: </br></br>- *bps* </br>- *Kbps* </br>- *Mbps* </br>- *Gbps* </br>- *Tbps* </br></br>`<Quantity>` is the quantity of your chosen unit. </br></br>For example, `10 Gbps`. | **Session aggregate maximum bit rate - Uplink** | Yes |
5152
|The maximum bitrate for traffic traveling towards UEs across all non-GBR QoS flows or EPS bearers of a given PDU session or PDN connection. The bitrate must be given in the following form: `<Quantity>` `<Unit>` </br></br>`<Unit>` must be one of the following: </br></br>- *bps* </br>- *Kbps* </br>- *Mbps* </br>- *Gbps* </br>- *Tbps* </br></br>`<Quantity>` is the quantity of your chosen unit. </br></br>For example, `10 Gbps`. | **Session aggregate maximum bit rate - Downlink** | Yes |

articles/private-5g-core/complete-private-mobile-network-prerequisites.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Choose whether each site in the private mobile network should provide coverage f
2626

2727
## Allocate subnets and IP addresses
2828

29-
Azure Private 5G Core requires a management network, access network, and data network. These networks can all be part of the same, larger network, or they can be separate. The approach you use depends on your traffic separation requirements.
29+
Azure Private 5G Core requires a management network, access network, and one or more data networks. These networks can all be part of the same, larger network, or they can be separate. The approach you use depends on your traffic separation requirements.
3030

3131
For each of these networks, allocate a subnet and then identify the listed IP addresses. If you're deploying multiple sites, you'll need to collect this information for each site.
3232

@@ -44,17 +44,22 @@ Depending on your networking requirements (for example, if a limited set of subn
4444

4545
- Network address in CIDR notation.
4646
- Default gateway.
47-
- One IP address for port 5 on the Azure Stack Edge Pro device.
4847
- One IP address for the control plane interface. For 5G, this interface is the N2 interface, whereas for 4G, it's the S1-MME interface.*
4948
- One IP address for the user plane interface. For 5G, this interface is the N3 interface, whereas for 4G, it's the S1-U interface.*
49+
- One IP address for port 5 on the Azure Stack Edge Pro device.
5050

51-
### Data network
51+
### Data networks
52+
53+
Allocate the following IP addresses for each data network in the site:
5254

5355
- Network address in CIDR notation.
5456
- Default gateway.
55-
- One IP address for port 6 on the Azure Stack Edge Pro device.
5657
- One IP address for the user plane interface. For 5G, this interface is the N6 interface, whereas for 4G, it's the SGi interface.*
5758

59+
The following IP address must be shared by all the data networks in the site:
60+
61+
- One IP address for port 6 on the Azure Stack Edge Pro device.
62+
5863
## Allocate user equipment (UE) IP address pools
5964

6065
Azure Private 5G Core supports the following IP address allocation methods for UEs.
@@ -63,14 +68,14 @@ Azure Private 5G Core supports the following IP address allocation methods for U
6368

6469
- Static. Static IP address allocation ensures that a UE receives the same IP address every time it connects to the private mobile network. This is useful when you want Internet of Things (IoT) applications to be able to consistently connect to the same device. For example, you may configure a video analysis application with the IP addresses of the cameras providing video streams. If these cameras have static IP addresses, you won't need to reconfigure the video analysis application with new IP addresses each time the cameras restart. You'll allocate static IP addresses to a UE as part of [provisioning its SIM](provision-sims-azure-portal.md).
6570

66-
You can choose to support one or both of these methods for each site in your private mobile network.
71+
You can choose to support one or both of these methods for each data network in your site.
6772

68-
For each site you're deploying, do the following:
73+
For each data network you're deploying, do the following:
6974

7075
- Decide which IP address allocation methods you want to support.
71-
- For each method you want to support, identify an IP address pool from which IP addresses can be allocated to UEs. You'll need to provide each IP address pool in CIDR notation.
76+
- For each method you want to support, identify an IP address pool from which IP addresses can be allocated to UEs. You'll need to provide each IP address pool in CIDR notation.
7277

73-
If you decide to support both methods for a particular site, ensure that the IP address pools are of the same size and don't overlap.
78+
If you decide to support both methods for a particular data network, ensure that the IP address pools are of the same size and don't overlap.
7479

7580
- Decide whether you want to enable Network Address and Port Translation (NAPT) for the data network. NAPT allows you to translate a large pool of private IP addresses for UEs to a small number of public IP addresses. The translation is performed at the point where traffic enters the data network, maximizing the utility of a limited supply of public IP addresses.
7681

@@ -89,7 +94,7 @@ DNS allows the translation between human-readable domain names and their associa
8994
For each site you're deploying, do the following.
9095

9196
- Ensure you have at least one network switch with at least three ports available. You'll connect each Azure Stack Edge Pro device to the switch(es) in the same site as part of the instructions in [Order and set up your Azure Stack Edge Pro device(s)](#order-and-set-up-your-azure-stack-edge-pro-devices).
92-
- If you're not enabling NAPT as described in [Allocate user equipment (UE) IP address pools](#allocate-user-equipment-ue-ip-address-pools), configure the data network to route traffic destined for the UE IP address pools via the IP address you allocated to the packet core instance's user plane interface on the data network.
97+
- For every network where you decided not to enable NAPT (as described in [Allocate user equipment (UE) IP address pools](#allocate-user-equipment-ue-ip-address-pools)), configure the data network to route traffic destined for the UE IP address pools via the IP address you allocated to the packet core instance's user plane interface on the data network.
9398

9499
### Ports required for local access
95100

@@ -103,7 +108,7 @@ You should set these up in addition to the [ports required for Azure Stack Edge
103108
| SCTP 38412 Inbound | Port 5 (Access network) | Control plane access signaling (N2 interface). </br>Only required for 5G deployments. |
104109
| SCTP 36412 Inbound | Port 5 (Access network) | Control plane access signaling (S1-MME interface). </br>Only required for 4G deployments. |
105110
| UDP 2152 In/Outbound | Port 5 (Access network) | Access network user plane data (N3 interface for 5G, S1-U for 4G). |
106-
| All IP traffic | Port 6 (Data network) | Data network user plane data (N6 interface for 5G, SGi for 4G). |
111+
| All IP traffic | Port 6 (Data networks) | Data network user plane data (N6 interface for 5G, SGi for 4G). |
107112

108113
## Order and set up your Azure Stack Edge Pro device(s)
109114

@@ -113,7 +118,7 @@ Do the following for each site you want to add to your private mobile network. D
113118
|--|--|--|
114119
| 1. | Complete the Azure Stack Edge Pro deployment checklist. | [Deployment checklist for your Azure Stack Edge Pro GPU device](../databox-online/azure-stack-edge-gpu-deploy-checklist.md)|
115120
| 2. | Order and prepare your Azure Stack Edge Pro device. | [Tutorial: Prepare to deploy Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-prep.md?tabs=azure-portal) |
116-
| 3. | Rack and cable your Azure Stack Edge Pro device. </br></br>When carrying out this procedure, you must ensure that the device has its ports connected as follows:</br></br>- Port 5 - access network</br>- Port 6 - data network</br></br>Additionally, you must have a port connected to your management network. You can choose any port from 2 to 4. | [Tutorial: Install Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-install.md) |
121+
| 3. | Rack and cable your Azure Stack Edge Pro device. </br></br>When carrying out this procedure, you must ensure that the device has its ports connected as follows:</br></br>- Port 5 - access network</br>- Port 6 - data networks</br></br>Additionally, you must have a port connected to your management network. You can choose any port from 2 to 4. | [Tutorial: Install Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-install.md) |
117122
| 4. | Connect to your Azure Stack Edge Pro device using the local web UI. | [Tutorial: Connect to Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-connect.md) |
118123
| 5. | Configure the network for your Azure Stack Edge Pro device. When carrying out the *Enable compute network* step of this procedure, ensure you use the port you've connected to your management network. | [Tutorial: Configure network for Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md) |
119124
| 6. | Configure a name, DNS name, and (optionally) time settings. | [Tutorial: Configure the device settings for Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-set-up-device-update-time.md) |

articles/private-5g-core/configure-service-sim-policy-arm-template.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,8 @@ If your environment meets the prerequisites and you're familiar with using ARM t
2424

2525
- Ensure you can sign in to the Azure portal using an account with access to the active subscription you used to create your private mobile network. This account must have the built-in Contributor or Owner role at the subscription scope.
2626
- Identify the name of the Mobile Network resource corresponding to your private mobile network and the resource group containing it.
27-
- Identify the name of the data network to which your private mobile network connects.
28-
- The ARM template is populated with values to configure a default service and SIM policy that allows all traffic in both directions.
27+
- Identify the name of the data network to which you want to assign the new policy.
28+
- The ARM template is populated with values to configure a default service and SIM policy that allows all traffic in both directions.
2929

3030
If you want to create a service and SIM policy for another purpose, use the information in [Collect the required information for a service](collect-required-information-for-service.md) and [Collect the required information for a SIM policy](collect-required-information-for-sim-policy.md) to design a service and SIM policy to meet your requirements. You'll enter these new values as part of deploying the ARM template.
3131

@@ -54,9 +54,9 @@ Two Azure resources are defined in the template.
5454
- **Location:** enter *eastus*.
5555
- **Existing Mobile Network Name:** enter the name of the Mobile Network resource representing your private mobile network.
5656
- **Existing Slice Name:** enter **slice-1**.
57-
- **Existing Data Network Name:** enter the name of the data network to which your private mobile network connects.
57+
- **Existing Data Network Name:** enter the name of the data network. This value must match the name you used when creating the data network.
5858

59-
1. If you want to use the default service and SIM policy, leave the remaining fields unchanged. Otherwise, fill out the remaining fields to match the service and SIM policy you want to configure, using the information you collected from [Collect the required information for a service](collect-required-information-for-service.md) and [Collect the required information for a SIM policy](collect-required-information-for-sim-policy.md).
59+
1. If you want to use the default service and SIM policy, leave the remaining fields unchanged. Otherwise, fill out the remaining fields to match the service and SIM policy you want to configure, using the information you collected from [Collect the required information for a service](collect-required-information-for-service.md) and [Collect the required information for a SIM policy](collect-required-information-for-sim-policy.md).
6060
1. Select **Review + create**.
6161
1. Azure will now validate the configuration values you've entered. You should see a message indicating that your values have passed validation.
6262

0 commit comments

Comments
 (0)