Muokkaa

Jaa


Azure Private 5G Core 2403 release notes

The following release notes identify the new features, critical open issues, and resolved issues for the 2403 release of Azure Private 5G Core (AP5GC). The release notes are continuously updated, with critical issues requiring a workaround added as they’re discovered. Before deploying this new version, review the information contained in these release notes.

This article applies to the AP5GC 2403 release (2403.0-4). This release is compatible with the Azure Stack Edge (ASE) Pro 1 GPU and Azure Stack Edge Pro 2 running the ASE 2403 release and supports the 2023-09-01, 2023-06-01 and 2022-11-01 Microsoft.MobileNetwork API versions.

For more information about compatibility, see Packet core and Azure Stack Edge compatibility.

For more information about new features in Azure Private 5G Core, see What's New Guide.

Support lifetime

Packet core versions are supported until two subsequent versions are released (unless otherwise noted). You should plan to upgrade your packet core in this time frame to avoid losing support.

Currently supported packet core versions

The following table shows the support status for different Packet Core releases and when they're expected to no longer be supported.

Release Support Status
AP5GC 2403 Supported until AP5GC 2407 is released
AP5GC 2310 Supported until AP5GC 2404 is released
AP5GC 2308 and earlier Out of Support

What's new

TCP Maximum Segment Size (MSS) Clamping

TCP session initial setup messages that include a Maximum Segment Size (MSS) value, which controls the size limit of packets transmitted during the session. The packet core now automatically sets this value, where necessary, to ensure packets aren't too large for the core to transmit. This reduces packet loss due to oversized packets arriving at the core's interfaces, and reduces the need for fragmentation and reassembly, which are costly procedures.

Improved Packet Core Scaling

In this release, the maximum supported limits for a range of parameters in an Azure Private 5G Core deployment increase. Testing confirms these limits, but other factors could affect what is achievable in a given scenario. The following table lists the new maximum supported limits.

Element Maximum supported
PDU sessions Enterprise radios typically support up to 1000 simultaneous PDU sessions per radio
Bandwidth Over 25 Gbps per ASE
RAN nodes (eNB/gNB) 200 per packet core
Active UEs 10,000 per deployment (all sites)
SIMs 20,000 per ASE
SIM provisioning 10,000 per JSON file via Azure portal, 4 MB per REST API call

For more information, see Service Limits.

Issues fixed in the AP5GC 2403 release

The following table provides a summary of issues fixed in this release.

No. Feature Issue SKU Fixed In
1 Local distributed tracing In Multi PDN session establishment/Release call flows with different DNs, the distributed tracing web GUI fails to display some of 4G NAS messages (Activate/deactivate Default EPS Bearer Context Request) and some S1AP messages (ERAB request, ERAB Release). 2403.0-2
2 Packet Forwarding A slight(0.01%) increase in packet drops is observed in latest AP5GC release installed on ASE Platform Pro 2 with ASE-2309 for throughput higher than 3.0 Gbps. 2403.0-2
3 Security CVE-2024-20685 2403.0-2
4 Packet Forwarding GTP Echo requests are rejected by the packet core on the N3 reference point, causing an outage of packet forwarding. 2403.0-4

Known issues in the AP5GC 2403 release

The following table provides a summary of known issues carried over from the previous releases.

No. Feature Issue Workaround/comments
1 Local distributed tracing When a web proxy is enabled on the Azure Stack Edge appliance that the packet core is running on and Azure Active Directory is used to authenticate access to AP5GC Local Dashboards, the traffic to Azure Active Directory doesn't transmit via the web proxy. If there's a firewall blocking traffic that doesn't go via the web proxy then enabling Azure Active Directory causes the packet core install to fail. Disable Azure Active Directory and use password based authentication to authenticate access to AP5GC Local Dashboards instead.

Next steps