Collect the required information for a site

Azure Private 5G Core private mobile networks include one or more sites. Each site represents a physical enterprise location (for example, Contoso Corporation's Chicago factory) containing an Azure Stack Edge device that hosts a packet core instance. This how-to guide takes you through the process of collecting the information you need to create a new site.

You can use this information to create a site in an existing private mobile network using the Azure portal. You can also use it as part of an ARM template to deploy a new private mobile network and site, or add a new site to an existing private mobile network.

Prerequisites

Choose a service plan

Choose the service plan that best fits your requirements and verify pricing and charges. See Azure Private 5G Core pricing.

Collect mobile network site resource values

Collect all the values in the following table for the mobile network site resource that will represent your site.

Value Field name in Azure portal
The Azure subscription to use to create the mobile network site resource. You must use the same subscription for all resources in your private mobile network deployment. Project details: Subscription
The Azure resource group in which to create the mobile network site resource. We recommend that you use the same resource group that already contains your private mobile network. Project details: Resource group
The name for the site. Instance details: Name
The region in which you deployed the private mobile network. Instance details: Region
The packet core in which to create the mobile network site resource. Instance details: Packet core name
The region code name of the region in which you deployed the private mobile network.

You only need to collect this value if you're going to create your site using an ARM template.
Not applicable.
The mobile network resource representing the private mobile network to which you’re adding the site.

You only need to collect this value if you're going to create your site using an ARM template.
Not applicable.
The service plan for the site that you are creating. See Azure Private 5G Core pricing. Instance details: Service plan

Collect packet core configuration values

Collect all the values in the following table for the packet core instance that will run in the site.

Value Field name in Azure portal
The core technology type the packet core instance should support: 5G, 4G, or combined 4G and 5G. Technology type
The Azure Stack Edge resource representing the Azure Stack Edge Pro device in the site. You created this resource as part of the steps in Order and set up your Azure Stack Edge Pro device(s).

If you're going to create your site using the Azure portal, collect the name of the Azure Stack Edge resource.

If you're going to create your site using an ARM template, collect the full resource ID of the Azure Stack Edge resource. You can do this by navigating to the Azure Stack Edge resource, selecting JSON View and copying the contents of the Resource ID field.
Azure Stack Edge device
The custom location that targets the Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) cluster on the Azure Stack Edge Pro device in the site. You commissioned the AKS-HCI cluster as part of the steps in Commission the AKS cluster.

If you're going to create your site using the Azure portal, collect the name of the custom location.

If you're going to create your site using an ARM template, collect the full resource ID of the custom location. You can do this by navigating to the Custom location resource, selecting JSON View and copying the contents of the Resource ID field.
Custom location

Collect access network values

Collect all the values in the following table to define the packet core instance's connection to the access network over the control plane and user plane interfaces. The field name displayed in the Azure portal will depend on the value you have chosen for Technology type, as described in Collect packet core configuration values.

Value Field name in Azure portal
The IP address for the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2 and S1-MME interfaces. You identified this address in Allocate subnets and IP addresses.

This IP address must match the value you used when deploying the AKS-HCI cluster on your Azure Stack Edge Pro device. You did this as part of the steps in Order and set up your Azure Stack Edge Pro device(s).
N2 address (Signaling) (for 5G), S1-MME address (for 4G), or S1-MME/N2 address (Signaling) (for combined 4G and 5G).
The virtual network name on port 5 on your Azure Stack Edge Pro device corresponding to the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2/S1-MME interface; for combined 4G and 5G, it's the N2/S1-MME interface. ASE N2 virtual subnet (for 5G), ASE S1-MME virtual subnet (for 4G), or ASE N2/S1-MME virtual subnet (for combined 4G and 5G).
The virtual network name on port 5 on your Azure Stack Edge Pro device corresponding to the user plane interface on the access network. For 5G, this interface is the N3 interface; for 4G, it's the S1-U interface; for combined 4G and 5G, it's the N3/S1-U interface. ASE N3 virtual subnet (for 5G), ASE S1-U virtual subnet (for 4G), or ASE N3/S1-U virtual subnet (for combined 4G and 5G).
Value Field name in Azure portal
The IP address for the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2 and S1-MME interfaces. You identified this address in Allocate subnets and IP addresses.

This IP address must match the value you used when deploying the AKS-HCI cluster on your Azure Stack Edge Pro device. You did this as part of the steps in Order and set up your Azure Stack Edge Pro device(s).
N2 address (Signaling) (for 5G), S1-MME address (for 4G), or S1-MME/N2 address (Signaling) (for combined 4G and 5G).
The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the control plane interface on the access network. For 5G, this interface is the N2 interface; for 4G, it's the S1-MME interface; for combined 4G and 5G, it's the N2/S1-MME interface. ASE N2 virtual subnet (for 5G), ASE S1-MME virtual subnet (for 4G), or ASE N2/S1-MME virtual subnet (for combined 4G and 5G).
The virtual network name on port 3 on your Azure Stack Edge Pro 2 corresponding to the user plane interface on the access network. For 5G, this interface is the N3 interface; for 4G, it's the S1-U interface; for combined 4G and 5G, it's the N3/S1-U interface. ASE N3 virtual subnet (for 5G), ASE S1-U virtual subnet (for 4G), or ASE N3/S1-U virtual subnet (for combined 4G and 5G).

Collect UE usage tracking values

If you want to configure UE usage tracking for your site, collect all the values in the following table to define the packet core instance's associated Event Hubs instance. See Monitor UE usage with Event Hubs for more information.

Note

You must already have an Azure Event Hubs instance with an associated user assigned managed identity with the Resource Policy Contributor role before you can collect the information in the following table.

Note

Azure Private 5G Core does not support Event Hubs with a log compaction delete cleanup policy.

Value Field name in Azure portal
The namespace for the Azure Event Hubs instance that your site will use for UE usage tracking. Azure Event Hub Namespace
The name of the Azure Event Hubs instance that your site will use for UE usage tracking. Event Hub name
The user assigned managed identity that has the Resource Policy Contributor role for the Event Hubs instance.
Note: The managed identity must be assigned to the Packet Core Control Plane for the site and assigned to the Event Hubs instance via the instance's Identity and Access Management (IAM) blade.
Note: Only assign one managed identity to the site. This managed identity must be used for any UE usage tracking for the site after upgrade and site configuration modifications.

See Use a user-assigned managed identity to capture events for more information on managed identities.
User Assigned Managed Identity

Collect data network values

You can configure up to ten data networks per site. During site creation, you'll be able to choose whether to attach an existing data network or create a new one.

For each data network that you want to configure, collect all the values in the following table. These values define the packet core instance's connection to the data network over the user plane interface, so you need to collect them whether you're creating the data network or using an existing one.

Value Field name in Azure portal
The name of the data network. This could be an existing data network or a new one you'll create during packet core configuration. Data network name
The virtual network name on port 6 (or port 5 if you plan to have more than six data networks) on your Azure Stack Edge Pro GPU device corresponding to the user plane interface on the data network. For 5G, this interface is the N6 interface; for 4G, it's the SGi interface; for combined 4G and 5G, it's the N6/SGi interface. ASE N6 virtual subnet (for 5G) or ASE SGi virtual subnet (for 4G), or ASE N6/SGi virtual subnet (for combined 4G and 5G).
The network address of the subnet from which dynamic IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You don't need this address if you don't want to support dynamic IP address allocation for this site. You identified this in Allocate user equipment (UE) IP address pools. The following example shows the network address format.

192.0.2.0/24

Note that the UE subnets aren't related to the access subnet.
Dynamic UE IP pool prefixes
The network address of the subnet from which static IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You don't need this address if you don't want to support static IP address allocation for this site. You identified this in Allocate user equipment (UE) IP address pools. The following example shows the network address format.

203.0.113.0/24

Note that the UE subnets aren't related to the access subnet.
Static UE IP pool prefixes
The Domain Name System (DNS) server addresses to be provided to the UEs connected to this data network. You identified this in Allocate subnets and IP addresses.

This value might be an empty list if you don't want to configure a DNS server for the data network. In this case, UEs in this data network will be unable to resolve domain names.
DNS Addresses
Whether Network Address and Port Translation (NAPT) should be enabled for this data network. NAPT allows you to translate a large pool of private IP addresses for UEs to a small number of public IP addresses. The translation is performed at the point where traffic enters the data network, maximizing the utility of a limited supply of public IP addresses.

When NAPT is disabled, static routes to the UE IP pools via the appropriate user plane data IP address for the corresponding attached data network must be configured in the data network router.

If you want to use UE-to-UE traffic in this data network, keep NAPT disabled.
NAPT
Value Field name in Azure portal
The name of the data network. This could be an existing data network or a new one you'll create during packet core configuration. Data network name
The virtual network name on port 4 (or port 3 if you plan to have more than six data networks) on your Azure Stack Edge Pro 2 device corresponding to the user plane interface on the data network. For 5G, this interface is the N6 interface; for 4G, it's the SGi interface; for combined 4G and 5G, it's the N6/SGi interface. ASE N6 virtual subnet (for 5G) or ASE SGi virtual subnet (for 4G), or ASE N6/SGi virtual subnet (for combined 4G and 5G).
The network address of the subnet from which dynamic IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You don't need this address if you don't want to support dynamic IP address allocation for this site. You identified this in Allocate user equipment (UE) IP address pools. The following example shows the network address format.

192.0.2.0/24

Note that the UE subnets aren't related to the access subnet.
Dynamic UE IP pool prefixes
The network address of the subnet from which static IP addresses must be allocated to user equipment (UEs), given in CIDR notation. You don't need this address if you don't want to support static IP address allocation for this site. You identified this in Allocate user equipment (UE) IP address pools. The following example shows the network address format.

203.0.113.0/24

Note that the UE subnets aren't related to the access subnet.
Static UE IP pool prefixes
The Domain Name System (DNS) server addresses to be provided to the UEs connected to this data network. You identified this in Allocate subnets and IP addresses.

This value might be an empty list if you don't want to configure a DNS server for the data network. In this case, UEs in this data network will be unable to resolve domain names.
DNS Addresses
Whether Network Address and Port Translation (NAPT) should be enabled for this data network. NAPT allows you to translate a large pool of private IP addresses for UEs to a small number of public IP addresses. The translation is performed at the point where traffic enters the data network, maximizing the utility of a limited supply of public IP addresses.

When NAPT is disabled, static routes to the UE IP pools via the appropriate user plane data IP address for the corresponding attached data network must be configured in the data network router.

If you want to use UE-to-UE traffic in this data network, keep NAPT disabled.
NAPT

Collect values for diagnostics package gathering

You can use a storage account and user assigned managed identity, with write access to the storage account, to gather diagnostics packages for the site.

If you don't want to configure diagnostics package gathering at this stage, you do not need to collect anything. You can configure this after site creation.

If you want to configure diagnostics package gathering during site creation, see Collect values for diagnostics package gathering.

Choose the authentication method for local monitoring tools

Azure Private 5G Core provides dashboards for monitoring your deployment and a web GUI for collecting detailed signal traces. You can access these tools using Microsoft Entra ID or a local username and password. We recommend setting up Microsoft Entra authentication to improve security in your deployment.

If you want to access your local monitoring tools using Microsoft Entra ID, after creating a site follow the steps in Enable Microsoft Entra ID for local monitoring tools.

If you want to access your local monitoring tools using local usernames and passwords, you don't need to set any additional configuration. After deploying the site, set up your username and password by following Access the distributed tracing web GUI and Access the packet core dashboards.

You'll be able to change the authentication method later by following Modify the local access configuration in a site.

Note

While in disconnected mode, you won't be able to change the local monitoring authentication method or sign in using Microsoft Entra ID. If you expect to need access to your local monitoring tools while the ASE is disconnected, consider using the local username and password authentication method instead.

Collect local monitoring values

You can use a self-signed or a custom certificate to secure access to the distributed tracing and packet core dashboards at the edge. We recommend that you provide your own HTTPS certificate signed by a globally known and trusted certificate authority (CA), as this provides additional security to your deployment and allows your browser to recognize the certificate signer.

If you don't want to provide a custom HTTPS certificate at this stage, you don't need to collect anything. You'll be able to change this configuration later by following Modify the local access configuration in a site.

If you want to provide a custom HTTPS certificate at site creation, follow the steps below.

  1. Either create an Azure Key Vault or choose an existing one to host your certificate. Ensure the key vault is configured with Azure Virtual Machines for deployment resource access.

  2. Ensure your certificate is stored in your key vault. You can either generate a Key Vault certificate or import an existing certificate to your Key Vault. Your certificate must:

    • Be signed by a globally known and trusted CA.
    • Use a private key of type RSA or EC to ensure it's exportable (see Exportable or non-exportable key for more information).

    We also recommend setting a DNS name for your certificate.

  3. If you want to configure your certificate to renew automatically, see Tutorial: Configure certificate auto-rotation in Key Vault for information on enabling auto-rotation.

    Note

    • Certificate validation will always be performed against the latest version of the local access certificate in the Key Vault.
    • If you enable auto-rotation, it might take up to four hours for certificate updates in the Key Vault to synchronize with the edge location.
  4. Decide how you want to provide access to your certificate. You can use a Key Vault access policy or Azure role-based access control (Azure RBAC).

  5. Collect the values in the following table.

    Value Field name in Azure portal
    The name of the Azure Key Vault containing the custom HTTPS certificate. Key vault
    The name of the CA-signed custom HTTPS certificate within the Azure Key Vault. Certificate

Next steps

Use the information you've collected to create the site: