The Inverse team is pleased to announce the immediate availability of PacketFence v8.3. This is a major release with new features, enhancements and bug fixes. This release is considered ready for production use and upgrading from previous versions is strongly advised.

     What is PacketFence?

PacketFence is a fully supported, trusted, Free and Open Source Network Access Control (NAC) solution. Boasting an impressive feature set, PacketFence can be used to effectively secure small to very large heterogeneous networks.

Among the features provided by PacketFence, there are:

 * powerful BYOD (Bring Your Own Device) capabilities
 * state-of-the art devices fingerprinting with Fingerbank
 * multiple enforcement methods including Role-Based Access Control
   (RBAC) and hotspot-style
 * compliance checks for endpoints present on your network
 * integration with various vulnerability scanners, intrusion detection
   solutions, security agents and firewalls
 * bandwidth accounting for all devices

A complete overview of the solution is available from the official website:https://packetfence.org/about.html


     Changes Since Previous Release

*New Features*

 * Added support for Juniper EX2300 (JUNOS 18.2) switches
 * Clickatell authentication source support
 * Added a random algorithm for VLAN pooling
 * Added the ability to reserve IP addresses in pfdhcp
 * Added a way to trigger a violation when device profiling detects a
   change in the device class
 * New SSL Inspection portal module
 * RADIUS proxy integration from web admin interface
 * RADIUS filtering support for
   pre_proxy/post_proxy/preacct/accounting/authorize phases
 * Updated the Windows provisioning agent to the new Golang based version

*Enhancements*

 * Redis now only listens on localhost (#3729)
 * Deprecate usage of roaring bitmap for the DHCP IP pool (#3779)
 *

   Email and SponsorEmail sources can have banned and allowed email
   domains (#3807)

 * Improved startup time of pfdhcp
 * Removed OPSWAT Metadefender Cloud support
 * Chose password hashing algorithm when creating a local user from a
   source
 * Define the length of the password to generate when creating a local
   user from a source
 * New "dummy" source just to compute the rules

*Bug Fixes*

 * Logs permissions and configuration for Debian (#3780)
 * Fixed missing cache directory for NTLM auth cache (#3788)
 * Fixed working directory of NTLM auth cache sync script (#3777)
 * Handled multiple LDAP hosts properly in NTLM auth cache (#3776)
 * Issue with the DHCP server that gives sometimes a duplicate IP address
 * Adjusted CentOS and RHEL dependencies
 * Fixed MAC filtered lookups that were cached in pfdns (#3785)
 * Fixed the OpenVAS integration to work with OpenVAS Manager 7.0
   (OpenVAS 9)
 * Fixed encoding of files created in the administration interface
   (force them to UTF-8)

Seehttps://github.com/inverse-inc/packetfence/compare/packetfence-8.2.1...packetfence-8.3.0for the complete change log.

See the UPGRADE file for notes about upgrading:https://github.com/inverse-inc/packetfence/tree/packetfence-8.3.0/UPGRADE.asciidoc


     Getting PacketFence

PacketFence is free software and is distributed under the GNU GPL. As such, you are free to download and try it by either getting the new release or by getting the sources:https://packetfence.org/download.html

Documentation about the installation and configuration of PacketFence is also available:https://packetfence.org/support/index.html#/documentation


     How Can I Help?

PacketFence is a collaborative effort in order to create the best Free and Open Source NAC solution. There are multiple ways you can contribute to the project:

 * Documentation reviews, enhancements and translations
 * Feature requests or by sharing your ideas
 *

   Participate in the discussion on mailing lists
   (https://packetfence.org/support/index.html#/community)

 * Patches for bugs or enhancements
 * Provide new translations of remediation pages


     Getting Support

For any questions, do not hesitate to contact us by writing tosupp...@inverse.ca <mailto:supp...@inverse.ca>

You can also fill our online form (https://inverse.ca/#contact) and a representative from Inverse will contact you.

Inverse offers professional services to organizations willing to secure their wired and wireless networks with the PacketFence solution.

--
Ludovic Marcotte
lmarco...@inverse.ca  ::  +1.514.755.3630  ::  https://inverse.ca
Inverse inc. :: Leaders behind SOGo (https://sogo.nu), PacketFence 
(https://packetfence.org) and Fingerbank (https://fingerbank.org)

_______________________________________________
PacketFence-devel mailing list
PacketFence-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-devel

Reply via email to