You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/azure-private-5g-core-release-notes-2404.md
+36-8Lines changed: 36 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Azure Private 5G Core 2404 release notes
3
-
description: Discover what's new in the Azure Private 5G Core 2404 release.
3
+
description: Discover What's New in the Azure Private 5G Core 2404 release.
4
4
author: paulcarter
5
5
ms.author: paulcarter
6
6
ms.service: private-5g-core
@@ -43,25 +43,53 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
43
43
44
44
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that, upgrading from this version to a future release will include the capability for In-Service Software Upgrades (ISSU).
45
45
46
-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
46
+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
47
47
48
48
### Azure Resource Health
49
49
50
-
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
50
+
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
51
51
52
52
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
53
53
54
-
<!--
55
-
** Removed NAS Encryption until configuration available **
56
54
### NAS Encryption
57
55
58
56
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
59
57
60
58
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
61
-
-->
62
59
63
-
<!--## Issues fixed in the AP5GC 2404 release
64
-
# NO FIXED ISSUES IN AP5GC2404
60
+
### RADIUS Authentication
61
+
62
+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
63
+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
64
+
65
+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
66
+
67
+
### VLAN Trunking
68
+
69
+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
70
+
71
+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
72
+
73
+
### Dual-router link redundancy
74
+
75
+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
76
+
77
+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
78
+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
79
+
80
+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
81
+
82
+
### RAN insights preview
83
+
84
+
We’re excited to announce that radio access network (RAN) insights is now in preview for AP5GC. This feature integrates third-party data from RAN vendors, collecting and displaying a subset of metrics from your Element Management Systems (EMS) as standard metrics in Azure. By leveraging Azure's capabilities, this integration offers a unified and simplified experience for monitoring and troubleshooting RAN across multiple vendors and locations. With RAN insights you will now be able to:
85
+
86
+
- View the metrics of your RAN to monitor their deployment’s performance, reliability, and connection status.
87
+
- Access geo maps for a visual overview of all connected access points along with health status and performance metrics of each radio.
88
+
- Use correlated metrics of your RAN and packet core to help diagnose and troubleshoot issues.
89
+
90
+
To learn more and get started, see [RAN Insights Concepts](ran-insights-concepts.md) and [Create a Radio Access Network Insights Resource](ran-insights-create-resource.md).
91
+
92
+
<!--# NO FIXED ISSUES IN AP5GC2404
65
93
66
94
The following table provides a summary of issues fixed in this release.
Copy file name to clipboardExpand all lines: articles/private-5g-core/whats-new.md
+45-16Lines changed: 45 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,24 +37,53 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
37
37
38
38
### In Service Software Upgrade
39
39
40
-
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates will include the capability for In-Service Software Upgrades (ISSU).
40
+
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates include the capability for In-Service Software Upgrades (ISSU).
41
41
42
-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
42
+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
43
43
44
44
### Azure Resource Health
45
45
46
46
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
47
47
48
48
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
49
49
50
-
<!--
51
-
** Removed NAS Encryption until configuration available **
52
50
### NAS Encryption
53
51
54
-
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments will be configured to preferentially use NEA2/EEA2 encryption.
52
+
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
55
53
56
54
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
57
-
-->
55
+
56
+
### RADIUS Authentication
57
+
58
+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
59
+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
60
+
61
+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
62
+
63
+
### VLAN Trunking
64
+
65
+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
66
+
67
+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
68
+
69
+
### Dual-router link redundancy
70
+
71
+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
72
+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
73
+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
74
+
75
+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
76
+
77
+
### RAN insights preview
78
+
79
+
We’re excited to announce that radio access network (RAN) insights is now in preview for AP5GC. This feature integrates third-party data from RAN vendors, collecting and displaying a subset of metrics from your Element Management Systems (EMS) as standard metrics in Azure. By leveraging Azure's capabilities, this integration offers a unified and simplified experience for monitoring and troubleshooting RAN across multiple vendors and locations. With RAN insights you will now be able to:
80
+
81
+
- View the metrics of your RAN to monitor their deployment’s performance, reliability, and connection status.
82
+
- Access geo maps for a visual overview of all connected access points along with health status and performance metrics of each radio.
83
+
- Use correlated metrics of your RAN and packet core to help diagnose and troubleshoot issues.
84
+
85
+
To learn more and get started, see [RAN Insights Concepts](ran-insights-concepts.md) and [Create a Radio Access Network Insights Resource](ran-insights-create-resource.md).
86
+
58
87
## April 2024
59
88
### Packet core 2403
60
89
@@ -66,7 +95,7 @@ The 2403 release for the Azure Private 5G Core packet core is now available. For
66
95
67
96
### TCP Maximum Segment Size (MSS) Clamping
68
97
69
-
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
98
+
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This setting reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
70
99
71
100
### Improved Packet Core Scaling
72
101
@@ -95,7 +124,7 @@ See [Azure Policy policy definitions for Azure Private 5G Core](azure-policy-ref
95
124
96
125
**Date available:** March 22, 2024
97
126
98
-
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). The concealment is performed by the UEs on registration, and deconcealment is performed by the packet core. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
127
+
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). UEs perform this concealment on registration, and the packet core performs the deconcealment. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
99
128
100
129
For more information, see [Enable SUPI concealment](supi-concealment.md).
101
130
@@ -106,7 +135,7 @@ For more information, see [Enable SUPI concealment](supi-concealment.md).
106
135
107
136
**Date available:** February 21, 2024
108
137
109
-
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you are using Microsoft Entra ID authentication, you should create this user prior to upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
138
+
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you're using Microsoft Entra ID authentication, you should create this user before upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
110
139
111
140
See [Enable Microsoft Entra ID for local monitoring tools](enable-azure-active-directory.md) for details.
112
141
@@ -125,7 +154,7 @@ Previously, packet capture could only be performed from edge sites, requiring lo
125
154
126
155
**Date available:** December 22, 2023
127
156
128
-
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
157
+
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This feature is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
129
158
130
159
## October 2023
131
160
### Packet core 2310
@@ -218,7 +247,7 @@ The UE usage tracking messages in Azure Event Hubs are now encoded in AVRO file
218
247
219
248
**Date available:** July 31, 2023
220
249
221
-
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
250
+
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This feature provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
222
251
### 2023-06-01 API
223
252
224
253
**Type:** New release
@@ -242,7 +271,7 @@ Note: ARM API users who did a PUT using the 2023-06-01 API and enabled configura
242
271
243
272
You can now use Azure Monitor Workbooks to monitor your private mobile network. Workbooks provide versatile tools for visualizing and analyzing data. You can use workbooks to gain insights into your connected resources - including the packet core, Azure Stack Edge devices and Kubernetes clusters - using a range of visualization options. You can create new workbooks or customize one of the included templates to suit your needs.
244
273
245
-
See [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md) to learn more.
274
+
For more information, see [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md).
246
275
247
276
## June 2023
248
277
@@ -263,7 +292,7 @@ It's now possible to:
263
292
- attach a new or existing data network.
264
293
- modify an attached data network's configuration.
265
294
266
-
This is followed by a few minutes of downtime, but not a packet core reinstall.
295
+
This change is followed by a few minutes of downtime, but not a packet core reinstall.
267
296
268
297
For details, see [Modify a packet core instance](modify-packet-core.md).
269
298
@@ -445,7 +474,7 @@ Make the following changes for each 2022-04-01-preview API template that you wan
445
474
1. In the **Packet Core Control Plane** resource:
446
475
1. Remove the field **properties.mobileNetwork**.
447
476
2. Add the new mandatory field **properties.sites**. This array must contain a reference to the site resource under which this control plane is being created.
448
-
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this to **Password**.
477
+
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this field to **Password**.
449
478
4. Update the field **properties.sku** according to the mapping in the following table.
450
479
451
480
| 2022-04-01-preview API | 2022-11-01 API |
@@ -579,9 +608,9 @@ This feature has the following limitations:
579
608
580
609
- Once more than a single Data Network is configured, further configuration changes require the packet core to be reinstalled. To ensure this reinstall happens only after you make all your changes, you must follow the process for installing and modifying as described in the documentation.
581
610
582
-
- VLAN separation of Data Networks is not supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
611
+
- VLAN separation of Data Networks isn't supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
583
612
584
-
- Metrics are not yet reported on a per-Data Network basis.
613
+
- Metrics aren't yet reported on a per-Data Network basis.
585
614
586
615
To add data networks to an existing site, see [Modify the packet core instance in a site](modify-packet-core.md). To create a new site, see [Create a site](create-a-site.md).
0 commit comments