The Inverse Team is pleased to announce the immediate availability of PacketFence 3.0.2. This is a minor release bringing security fixes, new hardware support, welcomed enhancements, bug fixes and updated translations. This release is considered ready for production use. Upgrade is recommended due to the security fixes it provides.
=== What is PacketFence ? === PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system. Boosting an impressive feature set including: * Registration and remediation through a captive portal * Detection of abnormal network activities using Snort IDS * Proactive vulnerability scans using Nessus * Isolation of problematic devices * 802.1X for wired and wireless networks * Wireless integration for all provided features * Supports complex and heterogeneous environments * VoIP / IP Telephony support and more! A set of screenshots is available from http://www.packetfence.org/tour/screenshots.html and a set of videos is available from http://www.packetfence.org/tour/videos.html === Changes Since Previous Release === Security Important security fixes have been applied to this version. Thanks to Matthew Daley for identifying them. See issues #1292 to #1296 for details. New Hardware Support * Trapeze Wireless controllers Enhancements * Wireless deauthentication in bridge mode for DLink DWS, HP MSM and Motorola controllers * Authentication modules now hold authentication error strings and can set node attributes on authentication * Several new configuration parameters to control guest signup, categorization and access durations * Improved validation when creating/importing multiple guest accounts * Captive portal's email confirmation page is now reachable from the management interface by default * Configuration files ownership validation on start-up and in `pfcmd checkup` * Inline firewall changes: prevent registered users from reaching the captive portal * Several new DHCP fingerprints (from our spinoff www.fingerbank.org) * Minor usability improvements * Reduced some false warnings in the logs on node de-registration (#1315) Bug Fixes * Permission denied when changing firewall rules (#1273) * Firewall doesn't allow broadcast packets on internal interfaces (#1316) * Pre-registered guest unregdate not set (#1301) * Allow incoming DNS on management interface to track users IPs in production VLANs * Guest access by SMS confirmation now properly record user's firstname and lastname (#1308) * Signup page now retain Phone provider value if there was a mistake in the form (#1309) * Cisco access point (AP) configuration mistake in documentation * Dashboard not printing the SQL stats when MySQL is not local (#1289) * Doubled allow subnets in captive-portal-common (#1242) * Unreliable encoding behavior messes up with translations (#1287) * Nodes are not unregistered on unregdate unless an expire mode is activated (#1298) * Add trigger or cascade to delete node_useragent when deleting a node (#1285) * Removed an error when validating multiple guest pre-registration * No admin username output when printing guest access codes * Guest access code are now sorted when using batch creation * Path problem in Proxy Bypass addon * Reduced documentation.conf startup annoyance when using custom authentication modules * Pinned Net-Appliance-Session version requirement in RPM Spec (#1312) * Some reports graphics were not properly dispalyed (#1234) Translations * Updated French (fr) translation ... and more. See the ChangeLog file for the complete list of changes and the UPGRADE file for notes about upgrading. Both files are in the PacketFence distribution. === Getting PacketFence === PacketFence is free software and is distributed under the GNU GPL. As such, you are free to download and try it by either getting the new release from: http://www.packetfence.org/download/releases.html or by getting the sources from the official monotone server using the instructions at http://www.packetfence.org/development/source_code_repository.html Documentation about the installation and configuration of PacketFence is available from: http://www.packetfence.org/documentation/ === How Can I Help ? === PacketFence is a collaborative effort in order to create the best Free and Open Source NAC solution. There are multiple ways you can contribute to the project: * Documentation reviews, enhancements and translations * Feature requests or by sharing your ideas * Participate in the discussion on mailing lists (http://www.packetfence.org/support/community.html) * Patches for bugs or enhancements * Provide new translations of remediation pages === Getting Support === For any questions, do not hesitate to contact us by writing to supp...@inverse.ca You can also fill our online form (http://www.inverse.ca/about/contact.html) and a representative from Inverse will contact you. Inverse offers professional services to organizations willing to secure their wired and wireless networks with the PacketFence solution. -- Olivier Bilodeau obilod...@inverse.ca :: +1.514.447.4918 *115 :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ The demand for IT networking professionals continues to grow, and the demand for specialized networking skills is growing even more rapidly. Take a complimentary Learning@Cisco Self-Assessment and learn about Cisco certifications, training, and career opportunities. http://p.sf.net/sfu/cisco-dev2dev _______________________________________________ Packetfence-announce mailing list Packetfenceemail@example.com https://lists.sourceforge.net/lists/listinfo/packetfence-announce