Skip to content

Commit de6ed09

Browse files
Updated release note and what's new guide now that portal updates rolled out.
1 parent 029d64b commit de6ed09

File tree

2 files changed

+59
-22
lines changed

2 files changed

+59
-22
lines changed

articles/private-5g-core/azure-private-5g-core-release-notes-2404.md

Lines changed: 24 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,24 +43,42 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
4343

4444
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that, upgrading from this version to a future release will include the capability for In-Service Software Upgrades (ISSU).
4545

46-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
46+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
4747

4848
### Azure Resource Health
4949

50-
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
50+
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
5151

5252
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
5353

54-
<!--
55-
** Removed NAS Encryption until configuration available **
5654
### NAS Encryption
5755

5856
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
5957

6058
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
61-
-->
6259

63-
<!--## Issues fixed in the AP5GC 2404 release
60+
### RADIUS Authentication
61+
62+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
63+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
64+
65+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
66+
67+
### VLAN Trunking
68+
69+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
70+
71+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
72+
73+
### Dual-router link redundancy
74+
75+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
76+
77+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
78+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
79+
80+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
81+
6482
# NO FIXED ISSUES IN AP5GC2404
6583

6684
The following table provides a summary of issues fixed in this release.

articles/private-5g-core/whats-new.md

Lines changed: 35 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -37,24 +37,43 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
3737

3838
### In Service Software Upgrade
3939

40-
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates will include the capability for In-Service Software Upgrades (ISSU).
40+
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates include the capability for In-Service Software Upgrades (ISSU).
4141

42-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
42+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
4343

4444
### Azure Resource Health
4545

4646
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
4747

4848
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
4949

50-
<!--
51-
** Removed NAS Encryption until configuration available **
5250
### NAS Encryption
5351

54-
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments will be configured to preferentially use NEA2/EEA2 encryption.
52+
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
5553

5654
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
57-
-->
55+
56+
### RADIUS Authentication
57+
58+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
59+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
60+
61+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
62+
63+
### VLAN Trunking
64+
65+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
66+
67+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
68+
69+
### Dual-router link redundancy
70+
71+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
72+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
73+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
74+
75+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
76+
5877
## April 2024
5978
### Packet core 2403
6079

@@ -66,7 +85,7 @@ The 2403 release for the Azure Private 5G Core packet core is now available. For
6685

6786
### TCP Maximum Segment Size (MSS) Clamping
6887

69-
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
88+
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This setting reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
7089

7190
### Improved Packet Core Scaling
7291

@@ -95,7 +114,7 @@ See [Azure Policy policy definitions for Azure Private 5G Core](azure-policy-ref
95114

96115
**Date available:** March 22, 2024
97116

98-
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). The concealment is performed by the UEs on registration, and deconcealment is performed by the packet core. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
117+
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). UEs perform this concealment on registration, and the packet core performs the deconcealment. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
99118

100119
For more information, see [Enable SUPI concealment](supi-concealment.md).
101120

@@ -106,7 +125,7 @@ For more information, see [Enable SUPI concealment](supi-concealment.md).
106125

107126
**Date available:** February 21, 2024
108127

109-
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you are using Microsoft Entra ID authentication, you should create this user prior to upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
128+
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you're using Microsoft Entra ID authentication, you should create this user before upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
110129

111130
See [Enable Microsoft Entra ID for local monitoring tools](enable-azure-active-directory.md) for details.
112131

@@ -125,7 +144,7 @@ Previously, packet capture could only be performed from edge sites, requiring lo
125144

126145
**Date available:** December 22, 2023
127146

128-
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
147+
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This feature is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
129148

130149
## October 2023
131150
### Packet core 2310
@@ -218,7 +237,7 @@ The UE usage tracking messages in Azure Event Hubs are now encoded in AVRO file
218237

219238
**Date available:** July 31, 2023
220239

221-
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
240+
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This feature provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
222241
### 2023-06-01 API
223242

224243
**Type:** New release
@@ -242,7 +261,7 @@ Note: ARM API users who did a PUT using the 2023-06-01 API and enabled configura
242261

243262
You can now use Azure Monitor Workbooks to monitor your private mobile network. Workbooks provide versatile tools for visualizing and analyzing data. You can use workbooks to gain insights into your connected resources - including the packet core, Azure Stack Edge devices and Kubernetes clusters - using a range of visualization options. You can create new workbooks or customize one of the included templates to suit your needs.
244263

245-
See [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md) to learn more.
264+
For more information, see [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md).
246265

247266
## June 2023
248267

@@ -263,7 +282,7 @@ It's now possible to:
263282
- attach a new or existing data network.
264283
- modify an attached data network's configuration.
265284

266-
This is followed by a few minutes of downtime, but not a packet core reinstall.
285+
This change is followed by a few minutes of downtime, but not a packet core reinstall.
267286

268287
For details, see [Modify a packet core instance](modify-packet-core.md).
269288

@@ -445,7 +464,7 @@ Make the following changes for each 2022-04-01-preview API template that you wan
445464
1. In the **Packet Core Control Plane** resource:
446465
1. Remove the field **properties.mobileNetwork**.
447466
2. Add the new mandatory field **properties.sites**. This array must contain a reference to the site resource under which this control plane is being created.
448-
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this to **Password**.
467+
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this field to **Password**.
449468
4. Update the field **properties.sku** according to the mapping in the following table.
450469

451470
| 2022-04-01-preview API | 2022-11-01 API |
@@ -579,9 +598,9 @@ This feature has the following limitations:
579598

580599
- Once more than a single Data Network is configured, further configuration changes require the packet core to be reinstalled. To ensure this reinstall happens only after you make all your changes, you must follow the process for installing and modifying as described in the documentation.
581600

582-
- VLAN separation of Data Networks is not supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
601+
- VLAN separation of Data Networks isn't supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
583602

584-
- Metrics are not yet reported on a per-Data Network basis.
603+
- Metrics aren't yet reported on a per-Data Network basis.
585604

586605
To add data networks to an existing site, see [Modify the packet core instance in a site](modify-packet-core.md). To create a new site, see [Create a site](create-a-site.md).
587606

0 commit comments

Comments
 (0)