The Inverse team is pleased to announce the immediate availability of 
PacketFence 4.4.0. This is a major release with new features, enhancements and 
important bug fixes. This release is considered ready for production use and 
upgrading from 4.3.0 is strongly advised.


What is PacketFence?

PacketFence is a fully supported, trusted, Free and Open Source Network Access 
Control (NAC) solution. Boasting an impressive feature set, PacketFence can be 
used to effectively secure small to very large heterogeneous networks.

Among the features provided by PacketFence, there are:

Powerful BYOD (Bring Your Own Device) workflows
Simple and efficient guests management
Multiple enforcement methods with Role-Based Access Control (RBAC)
Compliance checks for computers present on your network
Integration with various vulnerability scanners and intrusion detection 
solutions
Bandwidth accounting for all devices
A complete overview of the solution is available from the official website: 
http://www.packetfence.org/about/overview.html


Changes Since Previous Release

New Features

Added the possibility to search by computer name on the nodes page
Added support for the Anyfi WiFi controller
Show portal profiles directly on the admin gui
Added local account authentication for EAP
Added support for unreg date with dynamic year
Added support for NetGear FSM7328S switches
Added new network profile filter
Added external captive portal support for AeroHIVE
Added external captive portal support for Xirrus
Added support for Dynamic Access lists on the Cisco Catalyst 2960
Added the ability to search switches
Added support for Dlink DES3028 switches
Added reuse 802.1x credential on the portal profile
Added support for Mikrotik access point
Added ability to create local accounts when registering with external 
authentication sources
Enhancements

Added support to configure either NATting or routed mode for inline layer 2 
interfaces from the GUI
Added informational messages in the GUI for inline interfaces
Improvement of Inline Layer 3 (Inline L3 can only be defined behind Inline 
Layer 2 network)
pfbandwidthd is now able to capture on all inline interfaces
Added an option to set the timeout value for LDAP connections in authentication 
sources
FreeRADIUS default configuration should now be more scalable and resilient to 
misbehaving devices
Added the possibility to create rules using the username in OAuth 
authentication sources
Added the RADIUS request to the vlan filter
Moved from using Storable to Sereal to serialize cached data
Refactored portal profile filters to make it easier to extend
Improved support for Dlink DES 3526 switches
Rewrited log format [] for device mac () for switch "" for userID
Improve error handling of web api
Raised ServerLimit on Apache httpd.portal, lowered httpd.portal Timeout and 
KeepAliveTimeout to improve responsiveness under load
Do not overlay the controllerIp if one is already defined when creating a switch
Verify the user roles level before creating a user via the admin gui
Added test iplogs not closed in pftest
Remove direct usage of Apache2 modules in captive portal
Bug Fixes

Fix issue when adding multiple portal profile filters causing the wrong type to 
be picked
Fix issue when a trap is received for a switch that does not implement 
parseTrap()
Fix issue when a role is changed in the administration interface and the node's 
access is not reevaluated
Fix issue when a passthrough is not able to be resolved and would generate an 
invalid DNS response
Fix missing files in logrotate file
Fix issue when setting a port in trunk on a Cisco Catalyst 3560, 3750 and 3750G 
would fail
Fix admin roles for bulk actions for nodes/users
Fix issue where person was not updated in the database because of a case (non) 
match
Fix send user password by email from the GUI
Fix backward compatibility issue for gaming-registration that should redirect 
to device-registration
Fix device-registration and status pages that were not accessible in inline 
mode when doing high-availability
Fix filetype of wireless-profile.mobileconfig not being set properly
Fix issue of iplog entries not being closed
See https://github.com/inverse-inc/packetfence/commits/packetfence-4.4.0 for 
the complete change log.

See the UPGRADE file for notes about upgrading: 
https://github.com/inverse-inc/packetfence/tree/packetfence-4.4.0/UPGRADE.asciidoc


Getting PacketFence

PacketFence is free software and is distributed under the GNU GPL. As such, you 
are free to download and try it by either getting the new release or by getting 
the sources: http://www.packetfence.org/development/sourcecode.html

Documentation about the installation and configuration of PacketFence is also 
available: http://www.packetfence.org/documentation/


How Can I Help?

PacketFence is a collaborative effort in order to create the best Free and Open 
Source NAC solution. There are multiple ways you can contribute to the project:

Documentation reviews, enhancements and translations
Feature requests or by sharing your ideas
Participate in the discussion on mailing lists 
(http://www.packetfence.org/support/community.html)
Patches for bugs or enhancements
Provide new translations of remediation pages

Getting Support

For any questions, do not hesitate to contact us by writing to 
supp...@inverse.ca

You can also fill our online form (http://www.inverse.ca/about/contact.html) 
and a representative from Inverse will contact you.

Inverse offers professional services to organizations willing to secure their 
wired and wireless networks with the PacketFence solution.


------------------------------------------------------------------------------
Want excitement?
Manually upgrade your production database.
When you want reliability, choose Perforce
Perforce version control. Predictably reliable.
http://pubads.g.doubleclick.net/gampad/clk?id=157508191&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-announce mailing list
PacketFence-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-announce

Reply via email to