Skip to content

Commit e652841

Browse files
Merge pull request #276596 from PaulCarterMicrosoft/main
Updates to AP5GC 2404 Release Note & What's New Guide
2 parents b58565d + a995474 commit e652841

File tree

2 files changed

+81
-24
lines changed

2 files changed

+81
-24
lines changed

articles/private-5g-core/azure-private-5g-core-release-notes-2404.md

Lines changed: 36 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Private 5G Core 2404 release notes
3-
description: Discover what's new in the Azure Private 5G Core 2404 release.
3+
description: Discover What's New in the Azure Private 5G Core 2404 release.
44
author: paulcarter
55
ms.author: paulcarter
66
ms.service: private-5g-core
@@ -43,25 +43,53 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
4343

4444
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that, upgrading from this version to a future release will include the capability for In-Service Software Upgrades (ISSU).
4545

46-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
46+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
4747

4848
### Azure Resource Health
4949

50-
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
50+
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
5151

5252
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
5353

54-
<!--
55-
** Removed NAS Encryption until configuration available **
5654
### NAS Encryption
5755

5856
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
5957

6058
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
61-
-->
6259

63-
<!--## Issues fixed in the AP5GC 2404 release
64-
# NO FIXED ISSUES IN AP5GC2404
60+
### RADIUS Authentication
61+
62+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
63+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
64+
65+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
66+
67+
### VLAN Trunking
68+
69+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
70+
71+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
72+
73+
### Dual-router link redundancy
74+
75+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
76+
77+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
78+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
79+
80+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
81+
82+
### RAN insights preview
83+
84+
We’re excited to announce that radio access network (RAN) insights is now in preview for AP5GC. This feature integrates third-party data from RAN vendors, collecting and displaying a subset of metrics from your Element Management Systems (EMS) as standard metrics in Azure. By leveraging Azure's capabilities, this integration offers a unified and simplified experience for monitoring and troubleshooting RAN across multiple vendors and locations. With RAN insights you will now be able to:
85+
86+
- View the metrics of your RAN to monitor their deployment’s performance, reliability, and connection status.
87+
- Access geo maps for a visual overview of all connected access points along with health status and performance metrics of each radio.
88+
- Use correlated metrics of your RAN and packet core to help diagnose and troubleshoot issues.
89+
90+
To learn more and get started, see [RAN Insights Concepts](ran-insights-concepts.md) and [Create a Radio Access Network Insights Resource](ran-insights-create-resource.md).
91+
92+
<!--# NO FIXED ISSUES IN AP5GC2404
6593
6694
The following table provides a summary of issues fixed in this release.
6795

articles/private-5g-core/whats-new.md

Lines changed: 45 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -37,24 +37,53 @@ We're excited to announce that AP5GC is now resilient to system failures when ru
3737

3838
### In Service Software Upgrade
3939

40-
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates will include the capability for In-Service Software Upgrades (ISSU).
40+
In our commitment to continuous improvement and minimizing service impact we’re excited to announce that when upgrading from this version to a future release, updates include the capability for In-Service Software Upgrades (ISSU).
4141

42-
ISSU is supported for deployments on a 2-node cluster, software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software will automatically roll back to the previous version, also with minimal service disruption.
42+
ISSU is supported for deployments on a 2-node cluster. Software upgrades can be performed seamlessly, ensuring minimal disruption to your services. The upgrade completes with no loss of sessions or registrations and minimal packet loss and packet reordering. Should the upgrade fail, the software automatically rolls back to the previous version, also with minimal service disruption.
4343

4444
### Azure Resource Health
4545

4646
This feature allows you to monitor the health of your control plane resource using Azure Resource Health. Azure Resource Health is a service that processes and displays health signals from your resource and displays the health in the Azure portal. This service gives you a personalized dashboard showing all the times your resource was unavailable or in a degraded state, along with recommended actions to take to restore health.
4747

4848
For more information, on using Azure Resource Health to monitor the health of your deployment, see [Resource Health overview](../service-health/resource-health-overview.md).
4949

50-
<!--
51-
** Removed NAS Encryption until configuration available **
5250
### NAS Encryption
5351

54-
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments will be configured to preferentially use NEA2/EEA2 encryption.
52+
NAS (Non-Access-Stratum) encryption configuration determines the encryption algorithm applied to the management traffic between the UEs and the AMF(5G) or MME(4G). By default, for security reasons, Packet Core deployments are configured to preferentially use NEA2/EEA2 encryption.
5553

5654
You can change the preferred encryption level after deployment by [modifying the packet core configuration](modify-packet-core.md).
57-
-->
55+
56+
### RADIUS Authentication
57+
58+
The RADIUS authentication feature enables AP5GC to perform secondary authentication via an AAA server for 4G attach and establishing a PDN/PDU session for 4G and 5G.
59+
This feature can be enabled per DN to perform secondary authentication. PAP based secondary authentication is supported in current release.
60+
61+
For more information on configuration RADIUS Authentication for your deployment, see [RADIUS Authentication](security.md).
62+
63+
### VLAN Trunking
64+
65+
VLAN trunking provides a new method for configuring data networks. A single virtual network interface is used to carry all data plane traffic. The traffic is all VLAN tagged, with each DN using a separate VLAN to provide separation. Configuration to use VLAN trunking is done on both the ASE and Private Mobile Network. When AP5GC is deployed on a 2-node cluster, VLAN trunking is mandatory.
66+
67+
For more information on configuration of VLAN Trunking, see [Commission an AKS Cluster](commission-cluster.md?pivots=ase-pro-2#set-up-advanced-networking).
68+
69+
### Dual-router link redundancy
70+
71+
Link connectivity monitoring for High Availability now accommodates paired peer routers in a dual-redundancy topology. You can configure this by designating two BFD peer router IP addresses per interface – if this is set then:
72+
- Each Packet Core node establishes BFD sessions with each of these routers, rather than with the default gateway IP.
73+
- The interface is not considered to have lost connectivity unless both IPs in the redundant pair are unreachable.
74+
75+
For more information on configuration of dual-routers, see [Create a site](create-a-site.md) or [Modify a site](modify-packet-core.md).
76+
77+
### RAN insights preview
78+
79+
We’re excited to announce that radio access network (RAN) insights is now in preview for AP5GC. This feature integrates third-party data from RAN vendors, collecting and displaying a subset of metrics from your Element Management Systems (EMS) as standard metrics in Azure. By leveraging Azure's capabilities, this integration offers a unified and simplified experience for monitoring and troubleshooting RAN across multiple vendors and locations. With RAN insights you will now be able to:
80+
81+
- View the metrics of your RAN to monitor their deployment’s performance, reliability, and connection status.
82+
- Access geo maps for a visual overview of all connected access points along with health status and performance metrics of each radio.
83+
- Use correlated metrics of your RAN and packet core to help diagnose and troubleshoot issues.
84+
85+
To learn more and get started, see [RAN Insights Concepts](ran-insights-concepts.md) and [Create a Radio Access Network Insights Resource](ran-insights-create-resource.md).
86+
5887
## April 2024
5988
### Packet core 2403
6089

@@ -66,7 +95,7 @@ The 2403 release for the Azure Private 5G Core packet core is now available. For
6695

6796
### TCP Maximum Segment Size (MSS) Clamping
6897

69-
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
98+
TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This setting reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.
7099

71100
### Improved Packet Core Scaling
72101

@@ -95,7 +124,7 @@ See [Azure Policy policy definitions for Azure Private 5G Core](azure-policy-ref
95124

96125
**Date available:** March 22, 2024
97126

98-
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). The concealment is performed by the UEs on registration, and deconcealment is performed by the packet core. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
127+
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). UEs perform this concealment on registration, and the packet core performs the deconcealment. You can now securely manage the required private keys through the Azure portal and provision SIMs with public keys.
99128

100129
For more information, see [Enable SUPI concealment](supi-concealment.md).
101130

@@ -106,7 +135,7 @@ For more information, see [Enable SUPI concealment](supi-concealment.md).
106135

107136
**Date available:** February 21, 2024
108137

109-
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you are using Microsoft Entra ID authentication, you should create this user prior to upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
138+
Access to the [distributed tracing](distributed-tracing.md) tool now requires a dedicated sas.user role in Microsoft Entra ID. This user is available from AP5GC version 4.2310.0-8, and required from AP5GC version 2402 onwards. If you're using Microsoft Entra ID authentication, you should create this user before upgrading to version 2402 to avoid losing access to the tracing tool. Microsoft Entra ID access to the packet core dashboards is unchanged.
110139

111140
See [Enable Microsoft Entra ID for local monitoring tools](enable-azure-active-directory.md) for details.
112141

@@ -125,7 +154,7 @@ Previously, packet capture could only be performed from edge sites, requiring lo
125154

126155
**Date available:** December 22, 2023
127156

128-
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
157+
The new Edge Log Backhaul feature provides Microsoft support personnel with easy access to customer network function logs to help them troubleshoot and find root cause for customer issues. This feature is enabled by default. To disable this feature, [modify the packet core configuration](modify-packet-core.md).
129158

130159
## October 2023
131160
### Packet core 2310
@@ -218,7 +247,7 @@ The UE usage tracking messages in Azure Event Hubs are now encoded in AVRO file
218247

219248
**Date available:** July 31, 2023
220249

221-
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
250+
This feature changes the 4G NAS EMM cause code for “unknown user” (subscriber not provisioned on AP5GC) to “no-suitable-cells-in-ta-15” by default. This feature provides better interworking in scenarios where a single PLMN is used for multiple, independent mobile networks.
222251
### 2023-06-01 API
223252

224253
**Type:** New release
@@ -242,7 +271,7 @@ Note: ARM API users who did a PUT using the 2023-06-01 API and enabled configura
242271

243272
You can now use Azure Monitor Workbooks to monitor your private mobile network. Workbooks provide versatile tools for visualizing and analyzing data. You can use workbooks to gain insights into your connected resources - including the packet core, Azure Stack Edge devices and Kubernetes clusters - using a range of visualization options. You can create new workbooks or customize one of the included templates to suit your needs.
244273

245-
See [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md) to learn more.
274+
For more information, see [Monitor Azure Private 5G Core with Azure Monitor Workbooks](monitor-private-5g-core-workbooks.md).
246275

247276
## June 2023
248277

@@ -263,7 +292,7 @@ It's now possible to:
263292
- attach a new or existing data network.
264293
- modify an attached data network's configuration.
265294

266-
This is followed by a few minutes of downtime, but not a packet core reinstall.
295+
This change is followed by a few minutes of downtime, but not a packet core reinstall.
267296

268297
For details, see [Modify a packet core instance](modify-packet-core.md).
269298

@@ -445,7 +474,7 @@ Make the following changes for each 2022-04-01-preview API template that you wan
445474
1. In the **Packet Core Control Plane** resource:
446475
1. Remove the field **properties.mobileNetwork**.
447476
2. Add the new mandatory field **properties.sites**. This array must contain a reference to the site resource under which this control plane is being created.
448-
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this to **Password**.
477+
3. Add the new mandatory field **properties.localDiagnosticsAccess.authenticationType**. This field is an enum governing how users of local diagnostics APIs are authenticated. Set this field to **Password**.
449478
4. Update the field **properties.sku** according to the mapping in the following table.
450479

451480
| 2022-04-01-preview API | 2022-11-01 API |
@@ -579,9 +608,9 @@ This feature has the following limitations:
579608

580609
- Once more than a single Data Network is configured, further configuration changes require the packet core to be reinstalled. To ensure this reinstall happens only after you make all your changes, you must follow the process for installing and modifying as described in the documentation.
581610

582-
- VLAN separation of Data Networks is not supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
611+
- VLAN separation of Data Networks isn't supported. Only Layer 3 separation is supported (meaning you can't have overlapping IP address spaces across the Data Networks).
583612

584-
- Metrics are not yet reported on a per-Data Network basis.
613+
- Metrics aren't yet reported on a per-Data Network basis.
585614

586615
To add data networks to an existing site, see [Modify the packet core instance in a site](modify-packet-core.md). To create a new site, see [Create a site](create-a-site.md).
587616

0 commit comments

Comments
 (0)