You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/collect-required-information-for-a-site.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,11 +55,13 @@ Collect all the values in the following table to define the packet core instance
55
55
56
56
## Collect data network values
57
57
58
-
Collect all the values in the following table to define the packet core instance's connection to the data network over the user plane interface.
58
+
You can configure up to three data networks per site. During site creation, you'll be able to choose whether to attach an existing data network or create a new one.
59
+
60
+
For each data network that you want to configure, collect all the values in the following table. These values define the packet core instance's connection to the data network over the user plane interface, so you need to collect them whether you're creating the data network or using an existing one.
59
61
60
62
|Value |Field name in Azure portal |
61
63
|---------|---------|
62
-
| The name of the data network. |**Data network name**|
64
+
| The name of the data network. This could be an existing data network or a new one you'll create during packet core configuration.|**Data network name**|
63
65
| The virtual network name on port 6 on your Azure Stack Edge Pro device corresponding to the user plane interface on the data network. For 5G, this interface is the N6 interface; for 4G, it's the SGi interface. |**ASE N6 virtual subnet** (for 5G) or **ASE SGi virtual subnet** (for 4G). |
64
66
| The network address of the subnet from which dynamic IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You won't need this address if you don't want to support dynamic IP address allocation for this site. You identified this in [Allocate user equipment (UE) IP address pools](complete-private-mobile-network-prerequisites.md#allocate-user-equipment-ue-ip-address-pools). The following example shows the network address format. </br></br>`192.0.2.0/24` </br></br>Note that the UE subnets aren't related to the access subnet. |**Dynamic UE IP pool prefixes**|
65
67
| The network address of the subnet from which static IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You won't need this address if you don't want to support static IP address allocation for this site. You identified this in [Allocate user equipment (UE) IP address pools](complete-private-mobile-network-prerequisites.md#allocate-user-equipment-ue-ip-address-pools). The following example shows the network address format. </br></br>`203.0.113.0/24` </br></br>Note that the UE subnets aren't related to the access subnet. |**Static UE IP pool prefixes**|
Copy file name to clipboardExpand all lines: articles/private-5g-core/collect-required-information-for-sim-policy.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,13 +39,14 @@ Collect each of the values in the table below for your SIM policy.
39
39
| The subscriber profile ID for RAT/Frequency Priority ID (RFSP ID) for this SIM policy, as defined in TS 36.413. If you want to set an RFSP ID, you must specify an integer between 1 and 256. |**RFSP index**|No. Defaults to no value.|
40
40
41
41
## Collect information for the network scope
42
+
42
43
Within each SIM policy, you'll have a *network scope*. The network scope represents the data network to which SIMs assigned to the SIM policy will have access. It allows you to define the QoS policy settings used for the default QoS flow for PDU sessions involving these SIMs. These settings include the session aggregated maximum bit rate (Session-AMBR), 5G QoS identifier (5QI) or QoS class identifier (QCI) value, and Allocation and Retention Policy (ARP) priority level. You can also determine the services that will be offered to SIMs.
43
44
44
45
Collect each of the values in the table below for the network scope.
45
46
46
47
| Value | Azure portal field name | Included in example ARM template |
47
48
|--|--|--|
48
-
|The Data Network Name (DNN) of the data network. The DNN must match the one you used when creating the private mobile network. |**Data network**| Yes |
49
+
|The name of the data network. This must match the name you used when creating the data network. |**Data network**| Yes |
49
50
|The names of the services permitted on the data network. You must have already configured your chosen services. For more information on services, see [Policy control](policy-control.md). |**Service configuration**| No. The SIM policy will only use the service you configure using the same template. |
50
51
|The maximum bitrate for traffic traveling away from UEs across all non-GBR QoS flows or EPS bearers of a given PDU session or PDN connection. The bitrate must be given in the following form: `<Quantity>``<Unit>` </br></br>`<Unit>` must be one of the following: </br></br>- *bps* </br>- *Kbps* </br>- *Mbps* </br>- *Gbps* </br>- *Tbps* </br></br>`<Quantity>` is the quantity of your chosen unit. </br></br>For example, `10 Gbps`. |**Session aggregate maximum bit rate - Uplink**| Yes |
51
52
|The maximum bitrate for traffic traveling towards UEs across all non-GBR QoS flows or EPS bearers of a given PDU session or PDN connection. The bitrate must be given in the following form: `<Quantity>``<Unit>` </br></br>`<Unit>` must be one of the following: </br></br>- *bps* </br>- *Kbps* </br>- *Mbps* </br>- *Gbps* </br>- *Tbps* </br></br>`<Quantity>` is the quantity of your chosen unit. </br></br>For example, `10 Gbps`. |**Session aggregate maximum bit rate - Downlink**| Yes |
Copy file name to clipboardExpand all lines: articles/private-5g-core/complete-private-mobile-network-prerequisites.md
+16-11Lines changed: 16 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Choose whether each site in the private mobile network should provide coverage f
26
26
27
27
## Allocate subnets and IP addresses
28
28
29
-
Azure Private 5G Core requires a management network, access network, and data network. These networks can all be part of the same, larger network, or they can be separate. The approach you use depends on your traffic separation requirements.
29
+
Azure Private 5G Core requires a management network, access network, and one or more data networks. These networks can all be part of the same, larger network, or they can be separate. The approach you use depends on your traffic separation requirements.
30
30
31
31
For each of these networks, allocate a subnet and then identify the listed IP addresses. If you're deploying multiple sites, you'll need to collect this information for each site.
32
32
@@ -44,17 +44,22 @@ Depending on your networking requirements (for example, if a limited set of subn
44
44
45
45
- Network address in CIDR notation.
46
46
- Default gateway.
47
-
- One IP address for port 5 on the Azure Stack Edge Pro device.
48
47
- One IP address for the control plane interface. For 5G, this interface is the N2 interface, whereas for 4G, it's the S1-MME interface.*
49
48
- One IP address for the user plane interface. For 5G, this interface is the N3 interface, whereas for 4G, it's the S1-U interface.*
49
+
- One IP address for port 5 on the Azure Stack Edge Pro device.
50
50
51
-
### Data network
51
+
### Data networks
52
+
53
+
Allocate the following IP addresses for each data network in the site:
52
54
53
55
- Network address in CIDR notation.
54
56
- Default gateway.
55
-
- One IP address for port 6 on the Azure Stack Edge Pro device.
56
57
- One IP address for the user plane interface. For 5G, this interface is the N6 interface, whereas for 4G, it's the SGi interface.*
57
58
59
+
The following IP address must be shared by all the data networks in the site:
60
+
61
+
- One IP address for port 6 on the Azure Stack Edge Pro device.
62
+
58
63
## Allocate user equipment (UE) IP address pools
59
64
60
65
Azure Private 5G Core supports the following IP address allocation methods for UEs.
@@ -63,14 +68,14 @@ Azure Private 5G Core supports the following IP address allocation methods for U
63
68
64
69
- Static. Static IP address allocation ensures that a UE receives the same IP address every time it connects to the private mobile network. This is useful when you want Internet of Things (IoT) applications to be able to consistently connect to the same device. For example, you may configure a video analysis application with the IP addresses of the cameras providing video streams. If these cameras have static IP addresses, you won't need to reconfigure the video analysis application with new IP addresses each time the cameras restart. You'll allocate static IP addresses to a UE as part of [provisioning its SIM](provision-sims-azure-portal.md).
65
70
66
-
You can choose to support one or both of these methods for each site in your private mobile network.
71
+
You can choose to support one or both of these methods for each data network in your site.
67
72
68
-
For each site you're deploying, do the following:
73
+
For each data network you're deploying, do the following:
69
74
70
75
- Decide which IP address allocation methods you want to support.
71
-
- For each method you want to support, identify an IP address pool from which IP addresses can be allocated to UEs. You'll need to provide each IP address pool in CIDR notation.
76
+
- For each method you want to support, identify an IP address pool from which IP addresses can be allocated to UEs. You'll need to provide each IP address pool in CIDR notation.
72
77
73
-
If you decide to support both methods for a particular site, ensure that the IP address pools are of the same size and don't overlap.
78
+
If you decide to support both methods for a particular data network, ensure that the IP address pools are of the same size and don't overlap.
74
79
75
80
- Decide whether you want to enable Network Address and Port Translation (NAPT) for the data network. NAPT allows you to translate a large pool of private IP addresses for UEs to a small number of public IP addresses. The translation is performed at the point where traffic enters the data network, maximizing the utility of a limited supply of public IP addresses.
76
81
@@ -89,7 +94,7 @@ DNS allows the translation between human-readable domain names and their associa
89
94
For each site you're deploying, do the following.
90
95
91
96
- Ensure you have at least one network switch with at least three ports available. You'll connect each Azure Stack Edge Pro device to the switch(es) in the same site as part of the instructions in [Order and set up your Azure Stack Edge Pro device(s)](#order-and-set-up-your-azure-stack-edge-pro-devices).
92
-
-If you're not enabling NAPT as described in [Allocate user equipment (UE) IP address pools](#allocate-user-equipment-ue-ip-address-pools), configure the data network to route traffic destined for the UE IP address pools via the IP address you allocated to the packet core instance's user plane interface on the data network.
97
+
-For every network where you decided not to enable NAPT (as described in [Allocate user equipment (UE) IP address pools](#allocate-user-equipment-ue-ip-address-pools)), configure the data network to route traffic destined for the UE IP address pools via the IP address you allocated to the packet core instance's user plane interface on the data network.
93
98
94
99
### Ports required for local access
95
100
@@ -103,7 +108,7 @@ You should set these up in addition to the [ports required for Azure Stack Edge
103
108
| SCTP 38412 Inbound | Port 5 (Access network) | Control plane access signaling (N2 interface). </br>Only required for 5G deployments. |
104
109
| SCTP 36412 Inbound | Port 5 (Access network) | Control plane access signaling (S1-MME interface). </br>Only required for 4G deployments. |
105
110
| UDP 2152 In/Outbound | Port 5 (Access network) | Access network user plane data (N3 interface for 5G, S1-U for 4G). |
106
-
| All IP traffic | Port 6 (Data network) | Data network user plane data (N6 interface for 5G, SGi for 4G). |
111
+
| All IP traffic | Port 6 (Data networks) | Data network user plane data (N6 interface for 5G, SGi for 4G). |
107
112
108
113
## Order and set up your Azure Stack Edge Pro device(s)
109
114
@@ -113,7 +118,7 @@ Do the following for each site you want to add to your private mobile network. D
113
118
|--|--|--|
114
119
| 1. | Complete the Azure Stack Edge Pro deployment checklist. |[Deployment checklist for your Azure Stack Edge Pro GPU device](../databox-online/azure-stack-edge-gpu-deploy-checklist.md)|
115
120
| 2. | Order and prepare your Azure Stack Edge Pro device. |[Tutorial: Prepare to deploy Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-prep.md?tabs=azure-portal)|
116
-
| 3. | Rack and cable your Azure Stack Edge Pro device. </br></br>When carrying out this procedure, you must ensure that the device has its ports connected as follows:</br></br>- Port 5 - access network</br>- Port 6 - data network</br></br>Additionally, you must have a port connected to your management network. You can choose any port from 2 to 4. |[Tutorial: Install Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-install.md)|
121
+
| 3. | Rack and cable your Azure Stack Edge Pro device. </br></br>When carrying out this procedure, you must ensure that the device has its ports connected as follows:</br></br>- Port 5 - access network</br>- Port 6 - data networks</br></br>Additionally, you must have a port connected to your management network. You can choose any port from 2 to 4. |[Tutorial: Install Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-install.md)|
117
122
| 4. | Connect to your Azure Stack Edge Pro device using the local web UI. |[Tutorial: Connect to Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-connect.md)|
118
123
| 5. | Configure the network for your Azure Stack Edge Pro device. When carrying out the *Enable compute network* step of this procedure, ensure you use the port you've connected to your management network. |[Tutorial: Configure network for Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md)|
119
124
| 6. | Configure a name, DNS name, and (optionally) time settings. |[Tutorial: Configure the device settings for Azure Stack Edge Pro with GPU](../databox-online/azure-stack-edge-gpu-deploy-set-up-device-update-time.md)|
Copy file name to clipboardExpand all lines: articles/private-5g-core/configure-service-sim-policy-arm-template.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,8 +24,8 @@ If your environment meets the prerequisites and you're familiar with using ARM t
24
24
25
25
- Ensure you can sign in to the Azure portal using an account with access to the active subscription you used to create your private mobile network. This account must have the built-in Contributor or Owner role at the subscription scope.
26
26
- Identify the name of the Mobile Network resource corresponding to your private mobile network and the resource group containing it.
27
-
- Identify the name of the data network to which your private mobile network connects.
28
-
- The ARM template is populated with values to configure a default service and SIM policy that allows all traffic in both directions.
27
+
- Identify the name of the data network to which you want to assign the new policy.
28
+
- The ARM template is populated with values to configure a default service and SIM policy that allows all traffic in both directions.
29
29
30
30
If you want to create a service and SIM policy for another purpose, use the information in [Collect the required information for a service](collect-required-information-for-service.md) and [Collect the required information for a SIM policy](collect-required-information-for-sim-policy.md) to design a service and SIM policy to meet your requirements. You'll enter these new values as part of deploying the ARM template.
31
31
@@ -54,9 +54,9 @@ Two Azure resources are defined in the template.
54
54
-**Location:** enter *eastus*.
55
55
-**Existing Mobile Network Name:** enter the name of the Mobile Network resource representing your private mobile network.
56
56
-**Existing Slice Name:** enter **slice-1**.
57
-
-**Existing Data Network Name:** enter the name of the data network to which your private mobile network connects.
57
+
-**Existing Data Network Name:** enter the name of the data network. This value must match the name you used when creating the data network.
58
58
59
-
1. If you want to use the default service and SIM policy, leave the remaining fields unchanged. Otherwise, fill out the remaining fields to match the service and SIM policy you want to configure, using the information you collected from [Collect the required information for a service](collect-required-information-for-service.md) and [Collect the required information for a SIM policy](collect-required-information-for-sim-policy.md).
59
+
1. If you want to use the default service and SIM policy, leave the remaining fields unchanged. Otherwise, fill out the remaining fields to match the service and SIM policy you want to configure, using the information you collected from [Collect the required information for a service](collect-required-information-for-service.md) and [Collect the required information for a SIM policy](collect-required-information-for-sim-policy.md).
60
60
1. Select **Review + create**.
61
61
1. Azure will now validate the configuration values you've entered. You should see a message indicating that your values have passed validation.
0 commit comments