You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/collect-required-information-for-a-site.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,8 +67,8 @@ Collect all the values in the following table to define the packet core instance
67
67
|Value |Field name in Azure portal |
68
68
|---------|---------|
69
69
| The IP address for the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2 and S1-MME interfaces. You identified this address in [Allocate subnets and IP addresses](complete-private-mobile-network-prerequisites.md?pivots=ase-pro-2#allocate-subnets-and-ip-addresses). </br></br> This IP address must match the value you used when deploying the AKS-HCI cluster on your Azure Stack Edge Pro device. You did this as part of the steps in [Order and set up your Azure Stack Edge Pro device(s)](complete-private-mobile-network-prerequisites.md?pivots=ase-pro-2#order-and-set-up-your-azure-stack-edge-pro-devices). |**N2 address (Signaling)** (for 5G), **S1-MME address** (for 4G), or **S1-MME/N2 address (Signaling)** (for combined 4G and 5G). |
70
-
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2/S1-MME interface. |**ASE N2 virtual subnet** (for 5G), **ASE S1-MME virtual subnet** (for 4G), or **ASE N2/S1-MME virtual subnet** (for combined 4G and 5G). |
71
-
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the user plane interface on the access network. For 5G, this interface is the N3 interface; for 4G, it's the S1-U interface; for combined 4G and 5G, it's the N3/S1-U interface. |**ASE N3 virtual subnet** (for 5G), **ASE S1-U virtual subnet** (for 4G), or **ASE N3/S1-U virtual subnet** (for combined 4G and 5G). |
70
+
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2/S1-MME interface. </br></br> For an HA deployment, this IP address MUST NOT be in any control plane or user plane subnets; it is used as the destination of routes in the access network gateway router(s). |**ASE N2 virtual subnet** (for 5G), **ASE S1-MME virtual subnet** (for 4G), or **ASE N2/S1-MME virtual subnet** (for combined 4G and 5G). |
71
+
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the user plane interface on the access network. For 5G, this interface is the N3 interface; for 4G, it's the S1-U interface; for combined 4G and 5G, it's the N3/S1-U interface. </br></br> For an HA deployment, this IP address MUST NOT be in any control plane or user plane subnets; it is used as the destination of routes in the access network gateway router(s). |**ASE N3 virtual subnet** (for 5G), **ASE S1-U virtual subnet** (for 4G), or **ASE N3/S1-U virtual subnet** (for combined 4G and 5G). |
Copy file name to clipboardExpand all lines: articles/private-5g-core/configure-routers-high-availability.md
+27-24Lines changed: 27 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,50 +12,53 @@ ms.custom: template-how-to
12
12
13
13
# Configure routers for a Highly Available (HA) deployment
14
14
15
-
For a Highly Available Azure Private 5G Core deployment, you need to deploy a gateway router (strictly, a Layer 3 capable device – either a router or an L3 switch (router/switch hybrid)) in between the Azure Stack Edge cluster and:
15
+
In a Highly Available Azure Private 5G Core deployment, the Azure Kubernetes Service (AKS) cluster runs on a pair of ASE devices. The ASE devices are deployed in an active / standby configuration, with the backup ASE rapidly taking over service in the event of a failure. Incoming traffic uses a virtual IP address which is routed to the physical IP address of the active ASE. Bidirectional Forwarding Detection (BFD) is used to detect failures.
16
+
17
+
This requires you to deploy a gateway router between the ASE cluster and:
16
18
17
19
- the RAN equipment in the access network
18
20
- the data networks.
19
-
20
-
This how-to guide describes the configuration required on your routers to support an HA deployment.
21
21
22
-
## Access network router
22
+
The routers should rapidly detect the failure of an ASE device through a BFD session going down and immediately redirect all traffic to the other ASE. With the recommended settings, BFD should be able to detect failure in about one second, ensuring that traffic should be restored in less than 2.5 seconds.
23
+
24
+
This how-to guide describes the configuration required on your router or routers to support an HA deployment. The gateway router for the access network and the gateway router for the data networks may be the same device or separate devices.
25
+
26
+
## Collect router configuration values
27
+
28
+
To determine how to configure the static routes on the gateway routers, navigate to your **Packet Core Control Plane** resource in the Azure portal. Under **Settings**, select **Router configuration**. This shows the N2S1 and N3 virtual IP addresses, the IP prefix for all UE pools for each data network and the next hops and relative priorities.
29
+
30
+
## Configure the access network router
23
31
24
-
Configure routers in the access network with the following static routes. The IP addresses defined in the access network are described in [private mobile network prerequisites](/azure/private-5g-core/complete-private-mobile-network-prerequisites).
32
+
Configure the router in the access network with the following static routes. The IP addresses defined in the access network are described in [private mobile network prerequisites](/azure/private-5g-core/complete-private-mobile-network-prerequisites).
25
33
26
34
|Destination |Prefix length |Next hop |Priority (lower values are more preferred) |
27
35
|---------|---------|---------|---------|
28
36
|Virtual N2 | 32 |One of the IP addresses defined in the access network as vNIC addresses on the AMFs’ interfaces to the local access subnet. | 10 |
29
37
|Virtual N2 | 32 |The other IP address defined in the access network as vNIC addresses on the AMFs’ interfaces to the local access subnet. | 10 |
30
-
|Virtual N3 | 32 |The preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet.*| 10 |
31
-
|Virtual N3 | 32 |The non-preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet.*| 20 |
38
+
|Virtual N3 | 32 |The preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet. | 10 |
39
+
|Virtual N3 | 32 |The non-preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet. | 20 |
32
40
33
-
*See the [Gateway router](#gateway-router) section for how to view the preferred and non-preferred IP addresses.
41
+
### Configure BFD on the access network router
42
+
43
+
The access network router must be configured with the following BFD sessions:
44
+
45
+
- Two BFD sessions between the access network router and the pair of AMF vNIC addresses.
46
+
- Two BFD sessions between the access network router and the pair of UPF vNIC addresses in the access network.
34
47
35
-
## Data network router
48
+
BFD sessions on the access data network routers should be configured to use a polling interval of 330 ms. The maximum tolerable packet loss should be set to 3 packets (this is the default on most routers).
36
49
37
-
If network address translation (NAT) is not enabled, configure the routers in each data network with the following static routes. As for user plane traffic in the access network, one of the static routes is preferred to the other so that, in normal operation, all data network traffic uses the same route. Each data network supports a single subnet.
50
+
## Configure the data network routers
51
+
52
+
If network address translation (NAT) is not enabled, configure the routers in each data network with the following static routes. For user plane traffic in the access network, one of the static routes is preferred to the other so that, in normal operation, all data network traffic uses the same route. Each data network supports a single subnet.
38
53
39
54
|Destination |Prefix length |Next hop |Priority (lower values are more preferred) |
40
55
|---------|---------|---------|---------|
41
56
|All UE subnets | Variable |DN preferred vNIC (vNIC addresses on the UPFs’ interfaces to the DN).| 10 |
42
57
|All UE subnets | Variable |DN preferred vNIC (vNIC addresses on the UPFs’ interfaces to the DN).| 20 |
43
58
44
-
## Gateway router
45
-
46
-
To determine how to configure the static routes on the gateway routers, navigate to your **Packet Core Control Plane** resource in the Azure portal. Under **Settings**, select **Router configuration**. This shows the N2S1 and N3 virtual addresses, the IP prefix for all UE pools for each data network and the next hops and relative priorities.
47
-
48
-
## Bi-directional Forwarding Detection (BFD)
49
-
50
-
The access and data network routers must have the following BFD sessions configured:
51
-
52
-
- Two BFD sessions between the access network router and the pair of AMF vNIC addresses.
53
-
- Two BFD sessions between the access network router and the pair of UPF vNIC addresses in the access network.
54
-
- Two BFD sessions per data network between the data network router and the pair of UPF vNIC addresses in that data network.
55
-
56
-
BFD sessions on the access data network routers should be configured to use a polling interval of 200 ms. The maximum tolerable packet loss should be set to 3 packets (this is the default on most routers).
59
+
### Configure BFD on the data network routers
57
60
58
-
The routers should rapidly detect the failure of an Azure Stack Edge device through a BFD session going down and immediately redirect all traffic to the other Azure Stack Edge device. With the recommended settings, BFD should be able to detect failure in about 600 ms, ensuring that traffic should be restored in less than 1.5 seconds.
61
+
Each data network router must be configured with two BFD sessions between the data network router and the pair of UPF vNIC addresses in that data network.
0 commit comments