The Inverse Team is pleased to announce the immediate availability of 
PacketFence 3.6.0. This is a major release with a lot of new features, 
enhancements and important bug fixes. This release is considered ready 
for production use so upgrading to 3.6.0 is strongly advised.

=== What is PacketFence ? ===

PacketFence is a fully supported, trusted, Free and Open Source Network 
Access Control (NAC) solution. Boasting an impressive feature set, 
PacketFence can be used to effectively secure small to very large 
heterogeneous networks.

Among the features provided by PacketFence, there are:

  * Powerful BYOD (Bring Your Own Device) workflows
  * Simple and efficient guests management
  * Multiple enforcement methods with Role-Based Access Control (RBAC)
  * Compliance checks for computers present on your network
  * Integration with various vulnerability scanners and intrusion 
detection solutions
  * Bandwidth accounting for all devices

A complete overview of the solution is available from 
http://www.packetfence.org/about/overview.html

=== Some Changes Since Previous Release ===

New Hardware
  * New module for Cisco Catalyst 3750G to fix offset issues
  * Support for Cisco Catalyst 2960G in 802.1X / MAC-Authentication

Documentation
  * Clarified routed VLAN requirements (Patch from Brian Candler)
  * Added a quick install guide for Cisco Catalyst 2960

New Features
  * Integrated with Wireless IDS for Aruba, Motorola, and Ruckus controllers
  * OAuth2 as a valid authentication on the captive-portal 
(Google/Facebook/GitHub)
  * RADIUS inline feature
  * LLDP support for Cisco switches
  * Better WISPR support (integrated with Accuris Networks' WISPr Client)

Enhancements
  * Code cleanups (#1380,#1484,#1485)
  * Important simplification of the Captive Portal code to make it 
harder to introduce problems
  * Adding default OCSP/CRL Proxies (#1329)
  * New parameter to control captive portal interception: secure_redirect
  * Support for Perl 5.12+ (no longer relies on perl-suid, #1438)
  * Minor refactoring in the RADIUS perl modules
  * Removed 127.0.0.1 switch from the config and added in the code
  * Inline Mode now using ipset instead of just iptables
  * Selection of a preferred deauthentication method for a switch
  * Handling the MySQL startup in the web configurator
  * Disabling radutmp from the packetfence RADIUS virtual server (#1576)
  * Changing port of the configuration from 3000 to 1444 (#1506)
  * Debian packages improvements
  * Cometic fixes to RADIUS configs (radiusd.conf and packetfence-tunnel)
  * Improved the relevance of exit status in pfcmd_vlan (#1493)
  * New report for the Top 25 Sponsors
  * Make sure DHCP listenes on configured interfaces for routed reg/isol 
VLANs

Bug Fixes
  * Epic fight with MAC OSX DNS caching while using Inline Mode (#1535)
  * Translation of captive portal error messages
  * Side effect fixes of captive portal rework (#1366)
  * No more domain in our gettext po resources files (#1433)
  * Obtaining a node mark fixed for Debian/CentOS 6 (#1424)
  * Better POD for Nortel ERS5500 switches (#1450)
  * Allow dash in Role mappings (#1442)
  * Enforce inline network if you define an inline interface in pf.conf 
(#1584)
  * Adding radius.log into the logrotate script (#1526)
  * Tweaking some accounting queries for performance (#1534)
  * Regression in pfdhcplistener process management (introduced in 
3.5.1, #1545)
  * Guest management page doesn't load on Internet Explorer 7 (#1404)
  * Debian: issues with translations (#1465)
  * Debian: SSH and Telnet based deauthentication (#1511)
  * Translations: SoH admin page now properly show UTF-8 characters 
(partial #1531)
  * Typo in Admin Guide (#1383, Thanks to Alberto Chavez)
  * Additional fixes to pfdhcplistener process management

... and more. See the ChangeLog file for the complete list of changes 
and the UPGRADE file for notes about upgrading. Both files are in the 
PacketFence distribution.

=== Getting PacketFence ===

PacketFence is free software and is distributed under the GNU GPL. As 
such, you are free to download and try it by either getting the new 
release from:

http://www.packetfence.org/download/releases.html

or by getting the sources using the instructions at 
http://www.packetfence.org/development/sourcecode.html

Documentation about the installation and configuration of PacketFence is 
available from:

http://www.packetfence.org/documentation/

=== How Can I Help ? ===

PacketFence is a collaborative effort in order to create the best Free 
and Open Source NAC solution. There are multiple ways you can contribute 
to the project:

  * Documentation reviews, enhancements and translations
  * Feature requests or by sharing your ideas
  * Participate in the discussion on mailing lists 
(http://www.packetfence.org/support/community.html)
  * Patches for bugs or enhancements
  * Provide new translations of remediation pages

=== Getting Support ===

For any questions, do not hesitate to contact us by writing to 
supp...@inverse.ca

You can also fill our online form 
(http://www.inverse.ca/about/contact.html) and a representative from 
Inverse will contact you.

Inverse offers professional services to organizations willing to secure 
their wired and wireless networks with the PacketFence solution.

-- 
Francois Gaudreault, ing. jr
fgaudrea...@inverse.ca  ::  +1.514.447.4918 (x130) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_sfd2d_oct
_______________________________________________
PacketFence-announce mailing list
PacketFence-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-announce

Reply via email to