Skip to content

Commit 9b69116

Browse files
committed
note limitations
1 parent 77d1af4 commit 9b69116

File tree

2 files changed

+7
-1
lines changed

2 files changed

+7
-1
lines changed

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,11 @@ Collect all the values in the following table for the packet core instance that
5454

5555
## Collect RADIUS values
5656

57-
If you have a Remote Authentication Dial-In User Service (RADIUS) authentication, authorization and accounting (AAA) server in your network, you can optionally configure the packet core to use it to authenticate UEs on attachment to the network and session establishment. If you want to use RADIUS, collect all the values in the following table.
57+
If you have a Remote Authentication Dial-In User Service (RADIUS) authentication, authorization and accounting (AAA) server in your network, you can optionally configure the packet core to use it to authenticate UEs on attachment to the network and session establishment.
58+
59+
Your RADIUS server must be on your management network and reachable from your Azure Stack Edge device. RADIUS is only supported for authentication when UEs attach to the network or initiate a session. Other RADIUS features, such as accounting, are not supported.
60+
61+
If you want to use RADIUS, collect all the values in the following table.
5862

5963
|Value |Field name in Azure portal |
6064
|---------|---------|

articles/private-5g-core/security.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ As these credentials are highly sensitive, Azure Private 5G Core won't allow use
5454

5555
Azure Private 5G Core supports Remote Authentication Dial-In User Service (RADIUS) authentication. You can configure the packet core to contact a RADIUS authentication, authorization and accounting (AAA) server in your network to authenticate UEs on attachment to the network and session establishment. Communication between the packet core and RADIUS server is secured with a certificate stored in Azure Key Vault. The default username and password for UEs are also stored in Azure Key Vault. You can use the UE's International Mobile Subscriber Identity (IMSI) in place of a default username. See [Collect RADIUS values](collect-required-information-for-a-site.md#collect-radius-values) for details.
5656

57+
Your RADIUS server must be reachable from your Azure Stack Edge device on the management network. RADIUS is only supported for initial authentication. Other RADIUS features, such as accounting, are not supported.
58+
5759
## Access to local monitoring tools
5860

5961
### Secure connectivity using TLS/SSL certificates

0 commit comments

Comments
 (0)