The Inverse Team is pleased to announce the immediate availability of 
PacketFence 2.0.0. This is a major release bringing new features, new 
hardware support, performance enhancements, documentation update and 
other smaller changes. This release is considered ready for production use.

=== What is PacketFence ? ===

PacketFence is a fully supported, trusted, Free and Open Source network 
access control (NAC) system. Boosting an impressive feature set including:

  * Registration and remediation through a captive portal
  * Detection of abnormal network activities using Snort IDS
  * Proactive vulnerability scans using Nessus
  * Isolation of problematic devices
  * 802.1X for wired and wireless networks
  * Wireless integration for all provided features
  * Supports complex and heterogeneous environments
  * VoIP / IP Telephony support and more!

A set of screenshots is available from 
http://www.packetfence.org/tour/screenshots.html and a set of videos is 
available from http://www.packetfence.org/tour/videos.html

=== Changes Since Previous Release ===

New Hardware Support
  * SMC TigerStack 6128 L2 support in Port Security (feature sponsored 
by Seattle Pacific University)
  * HP ProCurve MSM710 Mobility Controller
  * Meru Networks MC3000 Wireless Controller
  * Juniper EX Series in MAC RADIUS (Juniper's MAC Authentication)

New Features
  * Simplification of the Wireless, Wired 802.1X and Wired MAC 
Authentication configuration. Because of a new FreeRADIUS module and a 
Web Service interface, everything is now using standard PacketFence 
proccesses and configuration files.
  * VoIP devices authorization over RADIUS (#1008)
  * Proxy interception. PacketFence can now operate in an environment 
where there is a client-side proxy configured. Check proxy-bypass in 
addons/ for details. (#1035)
  * Passthroughs support! You can now configure PacketFence to let your 
users reach specific websites even if they are in registration or 
isolation. (#772) (feature sponsored by Shippensburg University)
  * New pf::web::custom extension point to customize the captive 
portal's code without the usual maintenance burden on upgrades (#1045)
  * Bulk importation of nodes through CLI or Admin Web interface
  * New parameter in switches.conf to ease FreeRADIUS integration
  * Optional automatic configuration of FreeRADIUS' clients using 
switches.conf (see addons/freeradius-integration/README for details)
  * New 'pending' status for node. Allows for a wide range of captive 
portal workflows where an administrator approves network access (by 
email, SMS...)

Enhancements
  * New information available in Node Lookup (Connection Type, SSID, 
802.1X User-Name, ...)
  * FreeRADIUS module improvements (#1034) and major revamping
  * Easier installation process using yum groupinstall (#1089)
  * Faster Web Services layer running under mod_perl
  * Refactoring of the pf::vlan method names for more meaningful ones
  * Removed unnecessary database connections and duplicated code
  * 802.1X improvements (#995, #1002)
  * General code base improvements, refactoring (#914, #977, #1001, #973)
  * Usability improvements (#1006, #820, #1075)
  * Migrated to the new Emerging Threats rules for snort and added rules 
for botnets, malware, shellcode, trojan and worm by default (#1102)
  * New DHCP fingerprints (HP ProCurve Wireless, Ricoh MFP, 
Cisco/Linksys, Netgear, D-Link, Trendnet, Belkin Home Wireless Routers, 
Sony Ericsson, Android, Aruba Access Point, Avaya IP Phone, Gentoo Linux 
and Fedora Linux 13)
  * pfcmd_vlan's logging is now consistent with the rest of the system 
(#874)
  * configurator.pl now handles DNS and DHCP basic configuration (#1112)

Documentation
  * Merged Installation and Administration guides into a more coherent 
document
  * New documentation about DHCP and DNS services. Now easier to manage! 
(#1113)
  * New documentation about running in a routed environment
  * Improved documentation about Snort, Oinkmaster, and log rotation in 
Admin Guide
  * Improved documentation on violations (external remediation pages and 
redirect_url) in the Administration Guide

Bug fixes
  * Captive Portal remediation pages can be hosted externally again! (#1024)
  * Fixes to the SMC TigerStack 8824M and 8848M modules (see UPGRADE)
  * No error reporting when trying to change configuration files with 
bad rights (#1088)
  * Violation priorities are now enforced according to documentation (1 
= highest)
  * Wrong URL in the provided oinkmaster.conf (#1101)
  * MAC addresses of format xxxx.xxxx.xxxx properly recognized in pf::util

... and more. See the ChangeLog file for the complete list of changes 
and the UPGRADE file for notes about upgrading. Both files are in the 
PacketFence distribution.

=== Getting PacketFence ===

PacketFence is free software and is distributed under the GNU GPL. As 
such, you are free to download and try it by either getting the new 
release from:

http://prdownloads.sourceforge.net/packetfence/packetfence-2.0.0.tar.gz?download

or by getting the sources from the official monotone server using the 
instructions at 
http://www.packetfence.org/development/source_code_repository.html

Documentation about the installation and configuration of PacketFence is 
available from:

http://www.packetfence.org/documentation/documentation.html

=== How Can I Help ? ===

PacketFence is a collaborative effort in order to create the best Free 
and Open Source NAC solution. There are multiple ways you can contribute 
to the project:

  * Documentation reviews, enhancements and translations
  * Feature requests or by sharing your ideas
  * Participate in the discussion on mailing lists 
(http://www.packetfence.org/support/community.html)
  * Patches for bugs or enhancements
  * Provide new translations of remediation pages

=== Getting Support ===

For any questions, do not hesitate to contact us by writing to 
supp...@inverse.ca

You can also fill our online form 
(http://www.inverse.ca/about/contact.html) and a representative from 
Inverse will contact you.

Inverse offers professional services to organizations willing to secure 
their wired and wireless networks with the PacketFence solution.

-- 
Ludovic Marcotte
lmarco...@inverse.ca  ::  +1.514.755.3630  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)


------------------------------------------------------------------------------
Lotusphere 2011
Register now for Lotusphere 2011 and learn how
to connect the dots, take your collaborative environment
to the next level, and enter the era of Social Business.
http://p.sf.net/sfu/lotusphere-d2d
_______________________________________________
Packetfence-announce mailing list
Packetfence-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-announce

Reply via email to