You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/azure-private-5g-core-release-notes-2404.md
+24-6Lines changed: 24 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,24 +43,42 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
43
43
44
44
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that, upgrading from this version to a future release will include the capability for In-Service Software Upgrades (ISSU).
45
45
46
-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
46
+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
47
47
48
48
### Azure Resource Health
49
49
50
-
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
50
+
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
51
51
52
52
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
53
53
54
-
<!--
55
-
** Removed NAS Encryption until configuration available **
56
54
### NAS Encryption
57
55
58
56
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
59
57
60
58
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
61
-
-->
62
59
63
-
<!--## Issues fixed in the AP5GC 2404 release
60
+
### RADIUS Authentication
61
+
62
+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
63
+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
64
+
65
+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
66
+
67
+
### VLAN Trunking
68
+
69
+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
70
+
71
+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
72
+
73
+
### Dual-router link redundancy
74
+
75
+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
76
+
77
+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
78
+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
79
+
80
+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
81
+
64
82
# NO FIXED ISSUES IN AP5GC2404
65
83
66
84
The following table provides a summary of issues fixed in this release.
Copy file name to clipboardExpand all lines: articles/private-5g-core/whats-new.md
+35-16Lines changed: 35 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,24 +37,43 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
37
37
38
38
### In Service Software Upgrade
39
39
40
-
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates will include the capability for In-Service Software Upgrades (ISSU).
40
+
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates include the capability for In-Service Software Upgrades (ISSU).
41
41
42
-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
42
+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
43
43
44
44
### Azure Resource Health
45
45
46
46
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
47
47
48
48
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
49
49
50
-
<!--
51
-
** Removed NAS Encryption until configuration available **
52
50
### NAS Encryption
53
51
54
-
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments will be configured to preferentially use NEA2/EEA2 encryption.
52
+
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
55
53
56
54
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
57
-
-->
55
+
56
+
### RADIUS Authentication
57
+
58
+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
59
+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
60
+
61
+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
62
+
63
+
### VLAN Trunking
64
+
65
+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
66
+
67
+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
68
+
69
+
### Dual-router link redundancy
70
+
71
+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
72
+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
73
+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
74
+
75
+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
76
+
58
77
## April 2024
59
78
### Packet core 2403
60
79
@@ -66,7 +85,7 @@ The 2403 release for the Azure Private 5G Core packet core is now available. For
66
85
67
86
### TCP Maximum Segment Size (MSS) Clamping
68
87
69
-
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
88
+
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This setting reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
70
89
71
90
### Improved Packet Core Scaling
72
91
@@ -95,7 +114,7 @@ See [Azure Policy policy definitions for Azure Private 5G Core](azure-policy-ref
95
114
96
115
**Date available:** March 22, 2024
97
116
98
-
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). The concealment is performed by the UEs on registration, and deconcealment is performed by the packet core. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
117
+
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). UEs perform this concealment on registration, and the packet core performs the deconcealment. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
99
118
100
119
For more information, see [Enable SUPI concealment](supi-concealment.md).
101
120
@@ -106,7 +125,7 @@ For more information, see [Enable SUPI concealment](supi-concealment.md).
106
125
107
126
**Date available:** February 21, 2024
108
127
109
-
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you are using Microsoft Entra ID authentication, you should create this user prior to upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
128
+
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you're using Microsoft Entra ID authentication, you should create this user before upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
110
129
111
130
See [Enable Microsoft Entra ID for local monitoring tools](enable-azure-active-directory.md) for details.
112
131
@@ -125,7 +144,7 @@ Previously, packet capture could only be performed from edge sites, requiring lo
125
144
126
145
**Date available:** December 22, 2023
127
146
128
-
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
147
+
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This feature is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
129
148
130
149
## October 2023
131
150
### Packet core 2310
@@ -218,7 +237,7 @@ The UE usage tracking messages in Azure Event Hubs are now encoded in AVRO file
218
237
219
238
**Date available:** July 31, 2023
220
239
221
-
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
240
+
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This feature provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
222
241
### 2023-06-01 API
223
242
224
243
**Type:** New release
@@ -242,7 +261,7 @@ Note: ARM API users who did a PUT using the 2023-06-01 API and enabled configura
242
261
243
262
You can now use Azure Monitor Workbooks to monitor your private mobile network. Workbooks provide versatile tools for visualizing and analyzing data. You can use workbooks to gain insights into your connected resources - including the packet core, Azure Stack Edge devices and Kubernetes clusters - using a range of visualization options. You can create new workbooks or customize one of the included templates to suit your needs.
244
263
245
-
See [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md) to learn more.
264
+
For more information, see [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md).
246
265
247
266
## June 2023
248
267
@@ -263,7 +282,7 @@ It's now possible to:
263
282
- attach a new or existing data network.
264
283
- modify an attached data network's configuration.
265
284
266
-
This is followed by a few minutes of downtime, but not a packet core reinstall.
285
+
This change is followed by a few minutes of downtime, but not a packet core reinstall.
267
286
268
287
For details, see [Modify a packet core instance](modify-packet-core.md).
269
288
@@ -445,7 +464,7 @@ Make the following changes for each 2022-04-01-preview API template that you wan
445
464
1. In the **Packet Core Control Plane** resource:
446
465
1. Remove the field **properties.mobileNetwork**.
447
466
2. Add the new mandatory field **properties.sites**. This array must contain a reference to the site resource under which this control plane is being created.
448
-
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this to **Password**.
467
+
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this field to **Password**.
449
468
4. Update the field **properties.sku** according to the mapping in the following table.
450
469
451
470
| 2022-04-01-preview API | 2022-11-01 API |
@@ -579,9 +598,9 @@ This feature has the following limitations:
579
598
580
599
- Once more than a single Data Network is configured, further configuration changes require the packet core to be reinstalled. To ensure this reinstall happens only after you make all your changes, you must follow the process for installing and modifying as described in the documentation.
581
600
582
-
- VLAN separation of Data Networks is not supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
601
+
- VLAN separation of Data Networks isn't supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
583
602
584
-
- Metrics are not yet reported on a per-Data Network basis.
603
+
- Metrics aren't yet reported on a per-Data Network basis.
585
604
586
605
To add data networks to an existing site, see [Modify the packet core instance in a site](modify-packet-core.md). To create a new site, see [Create a site](create-a-site.md).
0 commit comments