The Inverse Team is pleased to announce the immediate availability of 
PacketFence 2.1.0. This is a major release bringing new hardware 
support, new features, enhancements, bug fixes and new translations. 
This release is considered ready for production use.

=== What is PacketFence ? ===

PacketFence is a fully supported, trusted, Free and Open Source network 
access control (NAC) system. Boosting an impressive feature set including:

  * Registration and remediation through a captive portal
  * Detection of abnormal network activities using Snort IDS
  * Proactive vulnerability scans using Nessus
  * Isolation of problematic devices
  * 802.1X for wired and wireless networks
  * Wireless integration for all provided features
  * Supports complex and heterogeneous environments
  * VoIP / IP Telephony support and more!

A set of screenshots is available from 
http://www.packetfence.org/tour/screenshots.html and a set of videos is 
available from http://www.packetfence.org/tour/videos.html

=== Changes Since Previous Release ===

New Hardware Support
  * Added Avaya as rebranded Nortel's
  * Support for Nortel's ERS5500 with firmware 6.x
  * 802.1X support with or without VoIP for Cisco 2950

New Features
  * New configuration validation interface in Web Admin and with "pfcmd 
checkup"
  * javascript-based network access detection (experimental)
  * JSON bindings for node information (experimental)

Enhancements
  * Improvements to our Nortel support
  * Developer documentation update
  * Friendlier startup error messages
  * More configuration validation on startup and in 'pfcmd checkup' 
(#1025, #1193)
  * Improved support for Desktop Linux clients (#1188)
  * New DHCP fingerprints for Cisco, UniData and Nortel IP Phones, Cisco 
Small Business switch, Netgear router, Generic Linux, Gentoo, Meego, 
LaCie NAS, Xyratex NAS, iPod/iPad, Samsung, LG, Sony Ericsson and Sharp 
smartphones, Samsung, HTC and Pantech Android phones, APC and Tripplite 
UPS, some Generic Thin Clients, HP, Xerox and Brother printers, Mac OS X 
and finally last but not least a what-is-believed to be a Palm OS 
fingerprint!
  * Improved test suite
  * Miscellaneous code cleanup (#1165)
  * Generated configuration files are now in var/... (#1014)
  * pid files are now in var/run/
  * Module versioning to improve handling of API changes in extension points
  * Improvements to Captive Portal library utilities

Bug fixes
  * Fixed an issue where warnings were not sent in Wired MAC 
Authentication if a device was isolated behind a VoIP phone
  * Removed misleading warnings on startup (#767)
  * fixed SNMPv3 sample configuration (Thanks to Nate Renbarger)
  * Allows apache2 as a valid httpd daemon name (#1185, Thanks to Jesper)
  * Violation with action autoreg is only triggered if node is not 
registered (#1026)
  * Fixed errors when editing a node with an unknown connection type (#1177)
  * No more warnings in node lookup (#1173)
  * Warning avoidance in pf::vlan's doWeActOnThisTrap (#832)
  * pfcmd_vlan regressions (#1190)
  * Worked around an upstream packaging problem with SOAP::Lite (#1194)
  * Fixed a configurator issue that could cause broken configuration 
files (#776)

Translations
  * New Brazilian Portuguese (pt_BR) translation (Thanks to Brivaldo 
Junior of Federal University of Mato Grosso do Sul)

... and more. See the ChangeLog file for the complete list of changes 
and the UPGRADE file for notes about upgrading. Both files are in the 
PacketFence distribution.

=== Getting PacketFence ===

PacketFence is free software and is distributed under the GNU GPL. As 
such, you are free to download and try it by either getting the new 
release from:

http://www.packetfence.org/download/releases.html

or by getting the sources from the official monotone server using the 
instructions at 
http://www.packetfence.org/development/source_code_repository.html

Documentation about the installation and configuration of PacketFence is 
available from:

http://www.packetfence.org/documentation/

=== How Can I Help ? ===

PacketFence is a collaborative effort in order to create the best Free 
and Open Source NAC solution. There are multiple ways you can contribute 
to the project:

  * Documentation reviews, enhancements and translations
  * Feature requests or by sharing your ideas
  * Participate in the discussion on mailing lists 
(http://www.packetfence.org/support/community.html)
  * Patches for bugs or enhancements
  * Provide new translations of remediation pages

=== Getting Support ===

For any questions, do not hesitate to contact us by writing to 
supp...@inverse.ca

You can also fill our online form 
(http://www.inverse.ca/about/contact.html) and a representative from 
Inverse will contact you.

Inverse offers professional services to organizations willing to secure 
their wired and wireless networks with the PacketFence solution.

Enjoy PacketFence's finest brew!
-- 
Olivier Bilodeau
obilod...@inverse.ca  ::  +1.514.447.4918 *115  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
Free Software Download: Index, Search & Analyze Logs and other IT data in 
Real-Time with Splunk. Collect, index and harness all the fast moving IT data 
generated by your applications, servers and devices whether physical, virtual
or in the cloud. Deliver compliance at lower cost and gain new business 
insights. http://p.sf.net/sfu/splunk-dev2dev 
_______________________________________________
Packetfence-devel mailing list
Packetfence-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-devel

Reply via email to