The Inverse team is pleased to announce the immediate availability of PacketFence v13.1. This is a minor release with new features, enhancements and bug fixes. This release is considered ready for production use and upgrading from previous versions is strongly advised.
What is PacketFence? PacketFence is a fully supported, trusted, Free and Open Source Network Access Control (NAC) solution. Boasting an impressive feature set, PacketFence can be used to effectively secure small to very large heterogeneous networks. Among the features provided by PacketFence, there are: * powerful BYOD (Bring Your Own Device) capabilities * multiple enforcement methods including Role-Based Access Control (RBAC) and hotspot-style * built-in network behaviour anomaly detection * state-of-the art devices identification with Fingerbank * compliance checks for endpoints present on your network * integration with various vulnerability scanners, intrusion detection solutions, security agents and firewalls * bandwidth accounting for all devices A complete overview of the solution is available from the official website: https://packetfence.org/about.html Changes Since Previous Release New Features * New NTLM authentication service (no more domain joins, Cloud-ready) * Added ACL pre-creation for individual and all switches (#7936) * Integrated Apache Kafka for reporting flows * Rewrote pfqueue in Go language Enhancements * RADIUS proxy configuration documentation and examples * Node import supports IPv4 address (#7808) * Added TCP flags parameter from role configuration in ACL for Cisco * Added documentation for Azure AD EAP-TLS machine authentication * Reuse the websocket buffer to reduce memory usage * Force mechanism LOGIN PLAIN for SMTP (#7813) * Use the same timezone in all Docker images (#7862) * Integrated Fingerbank Perl client into PacketFence's source code * Added many PKI improvements (generate CSR from CA, SCEP server proxy and resign certificate) * Moved Aruba, Fortinet and HP switches to OS-based modules Bug Fixes * Base64 encode the RADIUS request and store it in Redis (#7853) * Improve error handling if the calling station cannot be parsed in pfacct (#7871) * Add MariaDB to the OOM list * Specific Docker configuration to pull images behind a proxy (#7946) * Fix password of the day password generation (#7862) * Add back radiusd thread support (#7963) See https://github.com/inverse-inc/packetfence/compare/v13.0.0...v13.1.0 for the complete change log. See the Upgrade guide for notes about upgrading: https://packetfence.org/doc/PacketFence_Upgrade_Guide.html Getting PacketFence PacketFence is free software and is distributed under the GNU GPL. As such, you are free to download and try it by either getting the new release or by getting the sources: https://packetfence.org/download.html Documentation about the installation and configuration of PacketFence is also available: https://packetfence.org/support/index.html#/documentation How Can I Help? PacketFence is a collaborative effort in order to create the best Free and Open Source NAC solution. There are multiple ways you can contribute to the project: * Documentation reviews, enhancements and translations * Feature requests or by sharing your ideas * Participate in the discussion on mailing lists (https://packetfence.org/support/index.html#/community) * Patches for bugs or enhancements * Provide new translations of remediation pages Getting Support For any questions, do not hesitate to contact us by writing to supp...@inverse.ca<mailto:supp...@inverse.ca> You can also fill our online form (https://inverse.ca/#contact) and a representative from Inverse will contact you. Inverse offers professional services to organizations willing to secure their wired and wireless networks with the PacketFence solution.
_______________________________________________ PacketFence-announce mailing list PacketFence-announce@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-announce