The Inverse Team is pleased to announce the immediate availability of PacketFence 3.6.0. This is a major release with a lot of new features, enhancements and important bug fixes. This release is considered ready for production use so upgrading to 3.6.0 is strongly advised.
=== What is PacketFence ? === PacketFence is a fully supported, trusted, Free and Open Source Network Access Control (NAC) solution. Boasting an impressive feature set, PacketFence can be used to effectively secure small to very large heterogeneous networks. Among the features provided by PacketFence, there are: * Powerful BYOD (Bring Your Own Device) workflows * Simple and efficient guests management * Multiple enforcement methods with Role-Based Access Control (RBAC) * Compliance checks for computers present on your network * Integration with various vulnerability scanners and intrusion detection solutions * Bandwidth accounting for all devices A complete overview of the solution is available from http://www.packetfence.org/about/overview.html === Some Changes Since Previous Release === New Hardware * New module for Cisco Catalyst 3750G to fix offset issues * Support for Cisco Catalyst 2960G in 802.1X / MAC-Authentication Documentation * Clarified routed VLAN requirements (Patch from Brian Candler) * Added a quick install guide for Cisco Catalyst 2960 New Features * Integrated with Wireless IDS for Aruba, Motorola, and Ruckus controllers * OAuth2 as a valid authentication on the captive-portal (Google/Facebook/GitHub) * RADIUS inline feature * LLDP support for Cisco switches * Better WISPR support (integrated with Accuris Networks' WISPr Client) Enhancements * Code cleanups (#1380,#1484,#1485) * Important simplification of the Captive Portal code to make it harder to introduce problems * Adding default OCSP/CRL Proxies (#1329) * New parameter to control captive portal interception: secure_redirect * Support for Perl 5.12+ (no longer relies on perl-suid, #1438) * Minor refactoring in the RADIUS perl modules * Removed 127.0.0.1 switch from the config and added in the code * Inline Mode now using ipset instead of just iptables * Selection of a preferred deauthentication method for a switch * Handling the MySQL startup in the web configurator * Disabling radutmp from the packetfence RADIUS virtual server (#1576) * Changing port of the configuration from 3000 to 1444 (#1506) * Debian packages improvements * Cometic fixes to RADIUS configs (radiusd.conf and packetfence-tunnel) * Improved the relevance of exit status in pfcmd_vlan (#1493) * New report for the Top 25 Sponsors * Make sure DHCP listenes on configured interfaces for routed reg/isol VLANs Bug Fixes * Epic fight with MAC OSX DNS caching while using Inline Mode (#1535) * Translation of captive portal error messages * Side effect fixes of captive portal rework (#1366) * No more domain in our gettext po resources files (#1433) * Obtaining a node mark fixed for Debian/CentOS 6 (#1424) * Better POD for Nortel ERS5500 switches (#1450) * Allow dash in Role mappings (#1442) * Enforce inline network if you define an inline interface in pf.conf (#1584) * Adding radius.log into the logrotate script (#1526) * Tweaking some accounting queries for performance (#1534) * Regression in pfdhcplistener process management (introduced in 3.5.1, #1545) * Guest management page doesn't load on Internet Explorer 7 (#1404) * Debian: issues with translations (#1465) * Debian: SSH and Telnet based deauthentication (#1511) * Translations: SoH admin page now properly show UTF-8 characters (partial #1531) * Typo in Admin Guide (#1383, Thanks to Alberto Chavez) * Additional fixes to pfdhcplistener process management ... and more. See the ChangeLog file for the complete list of changes and the UPGRADE file for notes about upgrading. Both files are in the PacketFence distribution. === Getting PacketFence === PacketFence is free software and is distributed under the GNU GPL. As such, you are free to download and try it by either getting the new release from: http://www.packetfence.org/download/releases.html or by getting the sources using the instructions at http://www.packetfence.org/development/sourcecode.html Documentation about the installation and configuration of PacketFence is available from: http://www.packetfence.org/documentation/ === How Can I Help ? === PacketFence is a collaborative effort in order to create the best Free and Open Source NAC solution. There are multiple ways you can contribute to the project: * Documentation reviews, enhancements and translations * Feature requests or by sharing your ideas * Participate in the discussion on mailing lists (http://www.packetfence.org/support/community.html) * Patches for bugs or enhancements * Provide new translations of remediation pages === Getting Support === For any questions, do not hesitate to contact us by writing to supp...@inverse.ca You can also fill our online form (http://www.inverse.ca/about/contact.html) and a representative from Inverse will contact you. Inverse offers professional services to organizations willing to secure their wired and wireless networks with the PacketFence solution. -- Francois Gaudreault, ing. jr fgaudrea...@inverse.ca :: +1.514.447.4918 (x130) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ Everyone hates slow websites. So do we. Make your web apps faster with AppDynamics Download AppDynamics Lite for free today: http://p.sf.net/sfu/appdyn_sfd2d_oct _______________________________________________ PacketFence-announce mailing list PacketFenceemail@example.com https://lists.sourceforge.net/lists/listinfo/packetfence-announce