Numerous details are described in order to provide a thorough understanding of the example implementations shown in the drawings. However, the drawings merely show some example aspects of the present disclosure and are therefore not to be considered limiting. Those of ordinary skill in the art will appreciate that other effective aspects and/or variants do not include all of the specific details described herein. Moreover, well-known systems, methods, components, devices and circuits have not been described in exhaustive detail so as not to obscure more pertinent aspects of the example implementations described herein.
What are described are techniques and associated mechanisms to facilitate a secure remote access by a user equipment (UE) to an enterprise private Fifth Generation (5G) network of an enterprise, through a custom enterprise private network slice of a public 5G network. Such techniques and mechanisms may be facilitated by a Multi-access Edge Computing (MEC) service or other suitable service in the 5G network.
In general, traffic splitting functionality may be used in order to route enterprise user plane (UP) traffic from the UE using the private network slice while routing remaining subscriber UP traffic from the same UE using a subscriber network slice of the subscriber. Such a mechanism may be considered or viewed as a Split Virtual Private Network (VPN), where enterprise UP traffic is routed through a secure tunnel to the enterprise while remaining subscriber UP traffic is routed to the Internet or other public network.