The Inverse team is pleased to announce the immediate availability of PacketFence 5.5.0. This is a major release with new features, enhancements and important bug fixes. This release is considered ready for production use and upgrading from previous versions is strongly advised.

     What is PacketFence ?

PacketFence is a fully supported, trusted, Free and Open Source Network Access Control (NAC) solution. Boasting an impressive feature set, PacketFence can be used to effectively secure small to very large heterogeneous networks.

Among the features provided by PacketFence, there are:

 * powerful BYOD (Bring Your Own Device) capabilities
 * state-of-the art devices fingerprinting with Fingerbank
 * multiple enforcement methods including Role-Based Access Control
   (RBAC) and hotspot-style
 * compliance checks for endpoints present on your network
 * integration with various vulnerability scanners, intrusion detection
   solutions, security agents and firewalls
 * bandwidth accounting for all devices

A complete overview of the solution is available from the official website:

     Changes Since Previous Release

*New Features*

 * New device detection through TCP fingerprinting
 * New DHCPv6 fingerprinting through Fingerbank
 * New RADIUS filter engine to return custom attributes based on rules
 * Security Onion integration
 * Paypal payment is now supported in the captive portal
 * Stripe payment and subscriptions are now supported in the captive portal


 * New pfqueue service based on Redis to manage asynchronous tasks
 * Memcached has been replaced by Redis for all caching
 * pfdetect can now be configured through the administration interface
 * Added ability to detect hostname changes using the information in
   the DHCP packets
 * Added the ability to create not equal conditions in LDAP sources
 * DoS mitigation on the captive portal through mod_evasive
 * Load balancing in an active/active process now uses a dedicated process
 * Authentication and accounting are now in two different RADIUS processes
 * Reworked violation triggers creation in the administration interface
   so it’s more user friendly
 * Added the ability to create combined violation triggers which allow
   to trigger a violation based off multiple attributes of a node
 * Suricata alerts can now trigger a violation based on the alert
   category or description instead of only the ID of the alert
 * Added ability to e-mail device owner as a violation action

   The PacketFence syslog parser (pfdetect) has been reworked to allow
   multiple logs to be parsed concurrently

 * New ntlm_auth wrapper will log authentication latency to StatsD
 * Handle Microsoft Windows based captive-portal detection mechanisms
 * Manage pfdhcplistener status with keepalived and run pfdhcplistener
   on all cluster’s members
 * New portal profile filter (sub connection type)
 * Added switch IP and description in the available columns in the node
   list view
 * Use SNMP to determine the ifIndex based on the NAS-Port-Id
 * Improved metrics now track SQL queries, LDAP queries, and more
   granular metrics in RADIUS AAA
 * Added support for Nessus 6 scan engine
 * Added documentation for the Cisco iOS XE switches
 * Reworked existing billing providers to be PCI compliant
 * Billing providers are now part of the authentication sources
 * Billing tiers are now stored in the configuration instead of the
   source code files
 * Billing sources can now be used with other authentication sources on
   the same portal profile
 * DHCP packet processing is now fully done asynchronously to allow
   more PPS in the pfdhcplistener

*Bug Fixes (bug Id is denoted with #id)*

 * Fixed log rotation issue with the carbon daemons
 * Fixed LLDP phone detection if only telephone capability is enabled
 * Fixed keepalived and iptables configuration for portal interfaces
 * Fixed improper httpd status code being set
 * Removed the node delete button
 * Fixed detection if the device asks for a portal per URI
 * Fixed 3Com switches ifIndex calculation in stack mode using SNMP
 * Not-found users will now be cached when using the caching in an LDAP
   source (#978)
 * Updating a node puts an invalid entry in the voip field

See the complete change log.

See the UPGRADE file for notes about upgrading:

     Getting PacketFence

PacketFence is free software and is distributed under the GNU GPL. As such, you are free to download and try it by either getting the new release or by getting the sources:

Documentation about the installation and configuration of PacketFence is also available:

     How Can I Help ?

PacketFence is a collaborative effort in order to create the best Free and Open Source NAC solution. There are multiple ways you can contribute to the project:

 * Documentation reviews, enhancements and translations
 * Feature requests or by sharing your ideas

   Participate in the discussion on mailing lists

 * Patches for bugs or enhancements
 * Provide new translations of remediation pages

     Getting Support

For any questions, do not hesitate to contact us by writing <>

You can also fill our online form ( and a representative from Inverse will contact you.

Inverse offers professional services to organizations willing to secure their wired and wireless networks with the PacketFence solution.

Ludovic Marcotte  ::  +1.514.755.3630  ::
Inverse inc. :: Leaders behind SOGo ( and PacketFence 

Go from Idea to Many App Stores Faster with Intel(R) XDK
Give your users amazing mobile app experiences with Intel(R) XDK.
Use one codebase in this all-in-one HTML5 development environment.
Design, debug & build mobile apps & 2D/3D high-impact games for multiple OSs.
PacketFence-announce mailing list

Reply via email to