The Inverse team is pleased to announce the immediate availability of 
PacketFence 5.2.0. 
This is a major release with new features, enhancements and important bug 
fixes. 
This release is considered ready for production use and upgrading from previous 
versions is strongly advised.

What is PacketFence ?

PacketFence is a fully supported, trusted, Free and Open Source Network Access 
Control (NAC) solution. 
Boasting an impressive feature set, PacketFence can be used to effectively 
secure small to very large heterogeneous networks.

Among the features provided by PacketFence, there are:

        • powerful BYOD (Bring Your Own Device) capabilities
        • state-of-the art devices fingerprinting with Fingerbank
        • multiple enforcement methods including Role-Based Access Control 
(RBAC) and hotspot-style
        • compliance checks for endpoints present on your network
        • integration with various vulnerability scanners, intrusion detection 
solutions, security agents and firewalls
        • bandwidth accounting for all devices

A complete overview of the solution is available from the official website: 
http://www.packetfence.org/about/overview.html

Changes Since Previous Release

New Features

        • Introducing support for the PacketFence PKI application to manage 
certificates and authenticate RADIUS using EAP-TLS.
        • Twitter OAuth is now supported as an authentication source.
        • New 'portal' interface type to spawn a captive-portal instance on 
selected interface.
        • Inline mode now provides an ipset per devices role allowing for 
better granularity in managing them.
        • Support for OpenWrt 14.07 with hostapd.

Enhancements

        • Specific vhost for httpd.portal diagnostics.
        • Added option to disable logging of sensitive information when failing 
to execute a command through pf_run.
        • Support for Meraki APs using web authentication on the cloud 
controller.
        • Passwords are now obfuscated in the Switch configuration.
        • Introduced new 'ports.httpd_portal_modstatus' configuration parameter 
to limit modstatus to a single virtual host.

Bug Fixes

        • Allow the usage of an external monitoring database when using an 
Active/Active cluster.
        • Validate that a provisioner is not used before deleting it through 
the administration interface.
        • Stopped logging database password on schema import failure.
        • Fixed incorrect error message when an external portal authenticated 
device hits the unknown state.

See https://github.com/inverse-inc/packetfence/commits/packetfence-5.2.0 for 
the complete change log.

See the UPGRADE file for notes about upgrading: 
https://github.com/inverse-inc/packetfence/tree/packetfence-5.2.0/UPGRADE.asciidoc

Getting PacketFence

PacketFence is free software and is distributed under the GNU GPL. As such, you 
are free to download and try it by either getting the new release or by getting 
the sources: http://www.packetfence.org/development/sourcecode.html

Documentation about the installation and configuration of PacketFence is also 
available: http://www.packetfence.org/documentation/

How Can I Help ?

PacketFence is a collaborative effort in order to create the best Free and Open 
Source NAC solution. There are multiple ways you can contribute to the project:

        • Documentation reviews, enhancements and translations
        • Feature requests or by sharing your ideas
        • Participate in the discussion on mailing lists 
(http://www.packetfence.org/support/community.html)
        • Patches for bugs or enhancements
        • Provide new translations of remediation pages

Getting Support

For any questions, do not hesitate to contact us by writing to 
supp...@inverse.ca

You can also fill our online form (http://www.inverse.ca/#contact) and a 
representative from Inverse will contact you.

Inverse offers professional services to organizations willing to secure their 
wired and wireless networks with the PacketFence solution.



--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
_______________________________________________
PacketFence-announce mailing list
PacketFence-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-announce

Reply via email to