Skip to content

Commit 8b2dbe6

Browse files
committed
dev feedback and copy edits
1 parent d45f80e commit 8b2dbe6

File tree

2 files changed

+29
-26
lines changed

2 files changed

+29
-26
lines changed

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,8 +67,8 @@ Collect all the values in the following table to define the packet core instance
6767
|Value |Field name in Azure portal |
6868
|---------|---------|
6969
| The IP address for the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2 and S1-MME interfaces. You identified this address in [Allocate subnets and IP addresses](complete-private-mobile-network-prerequisites.md?pivots=ase-pro-2#allocate-subnets-and-ip-addresses). </br></br> This IP address must match the value you used when deploying the AKS-HCI cluster on your Azure Stack Edge Pro device. You did this as part of the steps in [Order and set up your Azure Stack Edge Pro device(s)](complete-private-mobile-network-prerequisites.md?pivots=ase-pro-2#order-and-set-up-your-azure-stack-edge-pro-devices). |**N2 address (Signaling)** (for 5G), **S1-MME address** (for 4G), or **S1-MME/N2 address (Signaling)** (for combined 4G and 5G). |
70-
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2/S1-MME interface. | **ASE N2 virtual subnet** (for 5G), **ASE S1-MME virtual subnet** (for 4G), or **ASE N2/S1-MME virtual subnet** (for combined 4G and 5G). |
71-
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the user plane interface on the access network. For 5G, this interface is the N3 interface; for 4G, it's the S1-U interface; for combined 4G and 5G, it's the N3/S1-U interface. | **ASE N3 virtual subnet** (for 5G), **ASE S1-U virtual subnet** (for 4G), or **ASE N3/S1-U virtual subnet** (for combined 4G and 5G). |
70+
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2/S1-MME interface. </br></br> For an HA deployment, this IP address MUST NOT be in any control plane or user plane subnets; it is used as the destination of routes in the access network gateway router(s). | **ASE N2 virtual subnet** (for 5G), **ASE S1-MME virtual subnet** (for 4G), or **ASE N2/S1-MME virtual subnet** (for combined 4G and 5G). |
71+
| The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the user plane interface on the access network. For 5G, this interface is the N3 interface; for 4G, it's the S1-U interface; for combined 4G and 5G, it's the N3/S1-U interface. </br></br> For an HA deployment, this IP address MUST NOT be in any control plane or user plane subnets; it is used as the destination of routes in the access network gateway router(s). | **ASE N3 virtual subnet** (for 5G), **ASE S1-U virtual subnet** (for 4G), or **ASE N3/S1-U virtual subnet** (for combined 4G and 5G). |
7272
:::zone-end
7373

7474
## Collect UE usage tracking values

articles/private-5g-core/configure-routers-high-availability.md

Lines changed: 27 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -12,50 +12,53 @@ ms.custom: template-how-to
1212

1313
# Configure routers for a Highly Available (HA) deployment
1414

15-
For a Highly Available Azure Private 5G Core deployment, you need to deploy a gateway router (strictly, a Layer 3 capable device – either a router or an L3 switch (router/switch hybrid)) in between the Azure Stack Edge cluster and:
15+
In a Highly Available Azure Private 5G Core deployment, the Azure Kubernetes Service (AKS) cluster runs on a pair of ASE devices. The ASE devices are deployed in an active / standby configuration, with the backup ASE rapidly taking over service in the event of a failure. Incoming traffic uses a virtual IP address which is routed to the physical IP address of the active ASE. Bidirectional Forwarding Detection (BFD) is used to detect failures.
16+
17+
This requires you to deploy a gateway router between the ASE cluster and:
1618

1719
- the RAN equipment in the access network
1820
- the data networks.
19-
20-
This how-to guide describes the configuration required on your routers to support an HA deployment.
2121

22-
## Access network router
22+
The routers should rapidly detect the failure of an ASE device through a BFD session going down and immediately redirect all traffic to the other ASE. With the recommended settings, BFD should be able to detect failure in about one second, ensuring that traffic should be restored in less than 2.5 seconds.
23+
24+
This how-to guide describes the configuration required on your router or routers to support an HA deployment. The gateway router for the access network and the gateway router for the data networks may be the same device or separate devices.
25+
26+
## Collect router configuration values
27+
28+
To determine how to configure the static routes on the gateway routers, navigate to your **Packet Core Control Plane** resource in the Azure portal. Under **Settings**, select **Router configuration**. This shows the N2S1 and N3 virtual IP addresses, the IP prefix for all UE pools for each data network and the next hops and relative priorities.
29+
30+
## Configure the access network router
2331

24-
Configure routers in the access network with the following static routes. The IP addresses defined in the access network are described in [private mobile network prerequisites](/azure/private-5g-core/complete-private-mobile-network-prerequisites).
32+
Configure the router in the access network with the following static routes. The IP addresses defined in the access network are described in [private mobile network prerequisites](/azure/private-5g-core/complete-private-mobile-network-prerequisites).
2533

2634
|Destination |Prefix length |Next hop |Priority (lower values are more preferred) |
2735
|---------|---------|---------|---------|
2836
|Virtual N2 | 32 |One of the IP addresses defined in the access network as vNIC addresses on the AMFs’ interfaces to the local access subnet. | 10 |
2937
|Virtual N2 | 32 |The other IP address defined in the access network as vNIC addresses on the AMFs’ interfaces to the local access subnet. | 10 |
30-
|Virtual N3 | 32 |The preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet.* | 10 |
31-
|Virtual N3 | 32 |The non-preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet.* | 20 |
38+
|Virtual N3 | 32 |The preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet. | 10 |
39+
|Virtual N3 | 32 |The non-preferred IP address defined in the access network as one of the vNIC addresses on the UPFs’ interfaces to the local access subnet. | 20 |
3240

33-
*See the [Gateway router](#gateway-router) section for how to view the preferred and non-preferred IP addresses.
41+
### Configure BFD on the access network router
42+
43+
The access network router must be configured with the following BFD sessions:
44+
45+
- Two BFD sessions between the access network router and the pair of AMF vNIC addresses.
46+
- Two BFD sessions between the access network router and the pair of UPF vNIC addresses in the access network.
3447

35-
## Data network router
48+
BFD sessions on the access data network routers should be configured to use a polling interval of 330 ms. The maximum tolerable packet loss should be set to 3 packets (this is the default on most routers).
3649

37-
If network address translation (NAT) is not enabled, configure the routers in each data network with the following static routes. As for user plane traffic in the access network, one of the static routes is preferred to the other so that, in normal operation, all data network traffic uses the same route. Each data network supports a single subnet.
50+
## Configure the data network routers
51+
52+
If network address translation (NAT) is not enabled, configure the routers in each data network with the following static routes. For user plane traffic in the access network, one of the static routes is preferred to the other so that, in normal operation, all data network traffic uses the same route. Each data network supports a single subnet.
3853

3954
|Destination |Prefix length |Next hop |Priority (lower values are more preferred) |
4055
|---------|---------|---------|---------|
4156
|All UE subnets | Variable |DN preferred vNIC (vNIC addresses on the UPFs’ interfaces to the DN).| 10 |
4257
|All UE subnets | Variable |DN preferred vNIC (vNIC addresses on the UPFs’ interfaces to the DN).| 20 |
4358

44-
## Gateway router
45-
46-
To determine how to configure the static routes on the gateway routers, navigate to your **Packet Core Control Plane** resource in the Azure portal. Under **Settings**, select **Router configuration**. This shows the N2S1 and N3 virtual addresses, the IP prefix for all UE pools for each data network and the next hops and relative priorities.
47-
48-
## Bi-directional Forwarding Detection (BFD)
49-
50-
The access and data network routers must have the following BFD sessions configured:
51-
52-
- Two BFD sessions between the access network router and the pair of AMF vNIC addresses.
53-
- Two BFD sessions between the access network router and the pair of UPF vNIC addresses in the access network.
54-
- Two BFD sessions per data network between the data network router and the pair of UPF vNIC addresses in that data network.
55-
56-
BFD sessions on the access data network routers should be configured to use a polling interval of 200 ms. The maximum tolerable packet loss should be set to 3 packets (this is the default on most routers).
59+
### Configure BFD on the data network routers
5760

58-
The routers should rapidly detect the failure of an Azure Stack Edge device through a BFD session going down and immediately redirect all traffic to the other Azure Stack Edge device. With the recommended settings, BFD should be able to detect failure in about 600 ms, ensuring that traffic should be restored in less than 1.5 seconds.
61+
Each data network router must be configured with two BFD sessions between the data network router and the pair of UPF vNIC addresses in that data network.
5962

6063
## Next steps
6164

0 commit comments

Comments
 (0)