|
| 1 | +--- |
| 2 | +title: Azure Private 5G Core 2308 release notes |
| 3 | +description: Discover what's new in the Azure Private 5G Core 2308 release |
| 4 | +author: paulcarter |
| 5 | +ms.author: paulcarter |
| 6 | +ms.service: private-5g-core |
| 7 | +ms.topic: release-notes |
| 8 | +ms.date: 09/21/2023 |
| 9 | +--- |
| 10 | + |
| 11 | +# Azure Private 5G Core 2308 release notes |
| 12 | + |
| 13 | +The following release notes identify the new features, critical open issues, and resolved issues for the 2308 release of Azure Private 5G Core (AP5GC). The release notes are continuously updated, with critical issues requiring a workaround added as they’re discovered. Before deploying this new version, review the information contained in these release notes. |
| 14 | + |
| 15 | +This article applies to the AP5GC 2308 release (2308.0-4). This release is compatible with the Azure Stack Edge Pro 1 GPU and Azure Stack Edge Pro 2 running the ASE 2303 and ASE 2309 releases and is supported by the 2023-06-01 and 2022-11-01 [Microsoft.MobileNetwork](/rest/api/mobilenetwork) API versions. |
| 16 | + |
| 17 | +For more details about compatibility, see [Packet core and Azure Stack Edge compatibility](azure-stack-edge-packet-core-compatibility.md). |
| 18 | + |
| 19 | +With this release, there's a new naming scheme and Packet Core versions are now called ‘2308.0-1’ rather than ‘PMN-2308.’ |
| 20 | + |
| 21 | +> [!WARNING] |
| 22 | +> For this release, it's important that the packet core version is upgraded to the AP5GC 2308 release before the upgrading to the ASE 2309 release. Upgrading to ASE 2309 before upgrading to Packet Core 2308.0.1 causes a total system outage. Recovery requires you to delete and re-create the AKS cluster on your ASE. |
| 23 | +
|
| 24 | +## Support lifetime |
| 25 | + |
| 26 | +Packet core versions are supported until two subsequent versions have been released (unless otherwise noted), which is typically two months after the release date. You should plan to upgrade your packet core in this time frame to avoid losing support. |
| 27 | + |
| 28 | +### Currently supported packet core versions |
| 29 | +The following table shows the support status for different Packet Core releases. |
| 30 | + |
| 31 | +| Release | Support Status | |
| 32 | +|---------|----------------| |
| 33 | +| AP5GC 2308 | Supported until AP5GC 2311 released | |
| 34 | +| AP5GC 2307 | Supported until AP5GC 2310 released | |
| 35 | +| AP5GC 2306 and earlier | Out of Support | |
| 36 | + |
| 37 | +## What's new |
| 38 | + |
| 39 | +### 10 DNs |
| 40 | +In this release, the number of supported data networks (DNs) increases from three to 10, including with layer 2 traffic separation. If more than 6 DNs are required, a shared switch for access and core traffic is needed. |
| 41 | + |
| 42 | +To add a data network to your packet core, see [Modify a packet core instance](modify-packet-core.md). |
| 43 | + |
| 44 | +### Default MTU values |
| 45 | +In this release, the default MTU values are changed as follows: |
| 46 | +- UE MTU: 1440 (was 1300) |
| 47 | +- Access MTU: 1500 (was 1500) |
| 48 | +- Data MTU: 1440 (was 1500) |
| 49 | + |
| 50 | +Customers upgrading to 2308 see a change in the MTU values on their packet core. |
| 51 | + |
| 52 | +When the UE MTU is set to any valid value (see API Spec), then the other MTUs are set to: |
| 53 | +- Access MTU: UE MTU + 60 |
| 54 | +- Data MTU: UE MTU |
| 55 | + |
| 56 | +Rollbacks to Packet Core versions earlier than 2308 are not possible if the UE MTU field is changed following an upgrade. |
| 57 | + |
| 58 | +To change the UE MTU signaled by the packet core, see [Modify a packet core instance](modify-packet-core.md). |
| 59 | + |
| 60 | +### MTU Interop setting |
| 61 | +In this release the MTU Interop setting is deprecated and can't be set for Packet Core versions 2308 and above. |
| 62 | + |
| 63 | +<!-- Removed as no issues fixed in the AP5GC2308 release> |
| 64 | +## Issues fixed in the AP5GC 2308 release |
| 65 | +
|
| 66 | +The following table provides a summary of issues fixed in this release. |
| 67 | +
|
| 68 | + |No. |Feature | Issue | |
| 69 | + |-----|-----|-----| |
| 70 | + | 1 | | | |
| 71 | +<--> |
| 72 | + |
| 73 | +## Known issues in the AP5GC 2308 release |
| 74 | + |No. |Feature | Issue | Workaround/comments | |
| 75 | + |-----|-----|-----|-----| |
| 76 | + | 1 | Packet Forwarding | A slight(0.01%) increase in packet drops is observed in latest AP5GC release installed on ASE Platform Pro2 with ASE-2309 for throughput higher than 3.0 Gbps. | None | |
| 77 | + | 2 | Local distributed tracing | In Multi PDN session establishment/Release call flows with different DNs, the distributed tracing web GUI fails to display some of 4G NAS messages (Activate/deactivate Default EPS Bearer Context Request) and some S1AP messages (ERAB request, ERAB Release). | None | |
| 78 | + | 3 | Local distributed tracing | When a web proxy is enabled on the Azure Stack Edge appliance that the packet core is running on and Azure Active Directory is used to authenticate access to AP5GC Local Dashboards, the traffic to Azure Active Directory doesn't transmit via the web proxy. If there's a firewall blocking traffic that does not go via the web proxy then enabling Azure Active Directory causes the packet core install to fail. | Disable Azure Active Directory and use password based authentication to authenticate access to AP5GC Local Dashboards instead. | |
| 79 | + | 4 | Packet Forwarding | In scenarios of sustained high load (for example, continuous setup of 100's of TCP flows per second) in 4G setups, AP5GC may encounter an internal error, leading to a short period of service disruption resulting in some call failures. | In most cases, the system will recover on its own and be able to handle new requests after a few seconds' disruption. For existing connections that are dropped the UEs need to re-establish the connection. | |
| 80 | + |
| 81 | + |
| 82 | +The following table provides a summary of known issues carried over from the previous releases. |
| 83 | + |
| 84 | + |No. |Feature | Issue | Workaround/comments | |
| 85 | + |-----|-----|-----|-----| |
| 86 | + | 1 | Local Dashboards | When a web proxy is enabled on the Azure Stack Edge appliance that the packet core is running on and Azure Active Directory is used to authenticate access to AP5GC Local Dashboards, the traffic to Azure Active Directory doesn't transmit via the web proxy. If there's a firewall blocking traffic that doesn't go via the web proxy then enabling Azure Active Directory causes the packet core install to fail. | Disable Azure Active Directory and use password based authentication to authenticate access to AP5GC Local Dashboards instead. | |
| 87 | + |
| 88 | + |
| 89 | +## Next steps |
| 90 | + |
| 91 | +- [Upgrade the packet core instance in a site - Azure portal](upgrade-packet-core-azure-portal.md) |
| 92 | +- [Upgrade the packet core instance in a site - ARM template](upgrade-packet-core-arm-template.md) |
0 commit comments