The Inverse Team is pleased to announce the immediate availability of
PacketFence 3.0.2. This is a minor release bringing security fixes, new
hardware support, welcomed enhancements, bug fixes and updated
translations. This release is considered ready for production use.
Upgrade is recommended due to the security fixes it provides.

=== What is PacketFence ? ===

PacketFence is a fully supported, trusted, Free and Open Source network
access control (NAC) system. Boosting an impressive feature set including:

 * Registration and remediation through a captive portal
 * Detection of abnormal network activities using Snort IDS
 * Proactive vulnerability scans using Nessus
 * Isolation of problematic devices
 * 802.1X for wired and wireless networks
 * Wireless integration for all provided features
 * Supports complex and heterogeneous environments
 * VoIP / IP Telephony support and more!

A set of screenshots is available from
http://www.packetfence.org/tour/screenshots.html and a set of videos is
available from http://www.packetfence.org/tour/videos.html

=== Changes Since Previous Release ===

Security

Important security fixes have been applied to this version. Thanks to
Matthew Daley for identifying them. See issues #1292 to #1296 for details.

New Hardware Support
 * Trapeze Wireless controllers

Enhancements
 * Wireless deauthentication in bridge mode for DLink DWS, HP MSM and
Motorola controllers
 * Authentication modules now hold authentication error strings and can
set node attributes on authentication
 * Several new configuration parameters to control guest signup,
categorization and access durations
 * Improved validation when creating/importing multiple guest accounts
 * Captive portal's email confirmation page is now reachable from the
management interface by default
 * Configuration files ownership validation on start-up and in `pfcmd
checkup`
 * Inline firewall changes: prevent registered users from reaching the
captive portal
 * Several new DHCP fingerprints (from our spinoff www.fingerbank.org)
 * Minor usability improvements
 * Reduced some false warnings in the logs on node de-registration (#1315)

Bug Fixes
 * Permission denied when changing firewall rules (#1273)
 * Firewall doesn't allow broadcast packets on internal interfaces (#1316)
 * Pre-registered guest unregdate not set (#1301)
 * Allow incoming DNS on management interface to track users IPs in
production VLANs
 * Guest access by SMS confirmation now properly record user's firstname
and lastname (#1308)
 * Signup page now retain Phone provider value if there was a mistake in
the form (#1309)
 * Cisco access point (AP) configuration mistake in documentation
 * Dashboard not printing the SQL stats when MySQL is not local (#1289)
 * Doubled allow subnets in captive-portal-common (#1242)
 * Unreliable encoding behavior messes up with translations (#1287)
 * Nodes are not unregistered on unregdate unless an expire mode is
activated (#1298)
 * Add trigger or cascade to delete node_useragent when deleting a node
(#1285)
 * Removed an error when validating multiple guest pre-registration
 * No admin username output when printing guest access codes
 * Guest access code are now sorted when using batch creation
 * Path problem in Proxy Bypass addon
 * Reduced documentation.conf startup annoyance when using custom
authentication modules
 * Pinned Net-Appliance-Session version requirement in RPM Spec (#1312)
 * Some reports graphics were not properly dispalyed (#1234)

Translations
 * Updated French (fr) translation

... and more. See the ChangeLog file for the complete list of changes
and the UPGRADE file for notes about upgrading. Both files are in the
PacketFence distribution.

=== Getting PacketFence ===

PacketFence is free software and is distributed under the GNU GPL. As
such, you are free to download and try it by either getting the new
release from:

http://www.packetfence.org/download/releases.html

or by getting the sources from the official monotone server using the
instructions at
http://www.packetfence.org/development/source_code_repository.html

Documentation about the installation and configuration of PacketFence is
available from:

http://www.packetfence.org/documentation/

=== How Can I Help ? ===

PacketFence is a collaborative effort in order to create the best Free
and Open Source NAC solution. There are multiple ways you can contribute
to the project:

 * Documentation reviews, enhancements and translations
 * Feature requests or by sharing your ideas
 * Participate in the discussion on mailing lists
(http://www.packetfence.org/support/community.html)
 * Patches for bugs or enhancements
 * Provide new translations of remediation pages

=== Getting Support ===

For any questions, do not hesitate to contact us by writing to
supp...@inverse.ca

You can also fill our online form
(http://www.inverse.ca/about/contact.html) and a representative from
Inverse will contact you.

Inverse offers professional services to organizations willing to secure
their wired and wireless networks with the PacketFence solution.


-- 
Olivier Bilodeau
obilod...@inverse.ca  ::  +1.514.447.4918 *115  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

------------------------------------------------------------------------------
The demand for IT networking professionals continues to grow, and the
demand for specialized networking skills is growing even more rapidly.
Take a complimentary Learning@Cisco Self-Assessment and learn 
about Cisco certifications, training, and career opportunities. 
http://p.sf.net/sfu/cisco-dev2dev
_______________________________________________
Packetfence-announce mailing list
Packetfence-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-announce

Reply via email to