The Inverse team is pleased to announce the immediate availability of
PacketFence v10.2. This is a major release with new features,
enhancements and bug fixes. This release is considered ready for
production use and upgrading from previous versions is strongly advised.
What is PacketFence?
PacketFence is a fully supported, trusted, Free and Open Source Network
Access Control (NAC) solution. Boasting an impressive feature set,
PacketFence can be used to effectively secure small to very large
heterogeneous networks.
Among the features provided by PacketFence, there are:
* powerful BYOD (Bring Your Own Device) capabilities
* multiple enforcement methods including Role-Based Access Control
(RBAC) and hotspot-style
* built-in network behaviour anomaly detection
* state-of-the art devices identification with Fingerbank
* compliance checks for endpoints present on your network
* integration with various vulnerability scanners, intrusion detection
solutions, security agents and firewalls
* bandwidth accounting for all devices
* ... and many more!
A complete overview of the solution is available from the official
website:https://packetfence.org/about.html
<https://packetfence.org/about.html>
Changes Since Previous Release
*New Features*
* EAP_TTLS PAP support for LDAP sources
* NetIQ eDirectory support
* Master/slave RADIUS proxy and degraded workflow
* Golang-based pfmon (#5613)
* Venom-based Configurator test (#5484)
*Enhancements*
* Adjust the settings in the admin for the SAML and OAuth portal
modules (#5479)
* Select the role of the device when register via self-service portal
* Improved support for Extreme Networks switches running EXOS
* Added option to register device immediately after the sponsor
activates the access during sponsor based registration (#5642)
* Added support for EAP-PEAP MSCHAPv2 and EAP-TLS for CLI and VPN
RADIUS authentication (#5784)
* Template-based bouncePort using CoA (#5735)
*
Set the default switch type to PacketFence::Standard (#5742)
*
Create a PacketFence::SNMP switch to force reevaluate access using
SNMP (#5742)
* Add support for CLI Access for Switch::Template (#5708)
* Use Status Check in pfstats to test RADIUS/Eduroam sources
*
Switch templates can define how to map a NasPort to anIfIndex
<https://wiki.inverse.ca/focus/IfIndex>(#5779)
* Syslog parsers are now tenant-aware
* Add default MAC address randomization security event check
* Allow to delete a node from web admin with a locationlog opened (#5492)
* Allow roles to be delete
*Bug Fixes*
* Fixed CoA for Meraki web-authentication so that it doesn't
disconnect the user from the SSID
* Honor the AUP setting of the SAML portal module (#5476)
*
Use the prebuilt FreeRADIUS Perl dictionary
* Do not override user defined values in the interface file for CentOS
* haproxy-db can cause pfcmd service restart to failed (#5745)
* Pass in the mandatory fields to the email templates
* Dell N1500.pm: LLDP detection doesn't work (#5758)
* Ensure the gateway was only written once in /etc/sysconfig/network
(#2845)
* Remove the ip address of a server in the DHCP reply when the server
has been disabled (#5677)
* Allow to set multiples CA certificates
* Listen to all interfaces for RADIUS accounting (#5821)
* Searching by 'Source Switch Identifier' for a switch range doesn't
work (#5792)
* Validity of the local accounts created on the portal is tied to the
access duration of the user.
Seehttps://github.com/inverse-inc/packetfence/compare/v10.1.0...v10.2.0
<https://github.com/inverse-inc/packetfence/compare/v10.1.0...v10.2.0>for
the complete change log.
See the Upgrade guide for notes about
upgrading:https://packetfence.org/doc/PacketFence_Upgrade_Guide.html
<https://packetfence.org/doc/PacketFence_Upgrade_Guide.html>
Getting PacketFence
PacketFence is free software and is distributed under the GNU GPL. As
such, you are free to download and try it by either getting the new
release or by getting the sources:https://packetfence.org/download.html
<https://packetfence.org/download.html>
Documentation about the installation and configuration of PacketFence is
also available:https://packetfence.org/support/index.html#/documentation
<https://packetfence.org/support/index.html#/documentation>
How Can I Help?
PacketFence is a collaborative effort in order to create the best Free
and Open Source NAC solution. There are multiple ways you can contribute
to the project:
* Documentation reviews, enhancements and translations
* Feature requests or by sharing your ideas
*
Participate in the discussion on mailing lists
(https://packetfence.org/support/index.html#/community
<https://packetfence.org/support/index.html#/community>)
* Patches for bugs or enhancements
* Provide new translations of remediation pages
Getting Support
For any questions, do not hesitate to contact us by writing
tosupp...@inverse.ca <mailto:supp...@inverse.ca>
You can also fill our online form (https://inverse.ca/#contact
<https://inverse.ca/#contact>) and a representative from Inverse will
contact you.
Inverse offers professional services to organizations willing to secure
their wired and wireless networks with the PacketFence solution.
--
Ludovic Marcotte
lmarco...@inverse.ca :: +1.514.755.3630 :: https://inverse.ca
Inverse inc. :: Leaders behind SOGo (https://sogo.nu), PacketFence
(https://packetfence.org) and Fingerbank (https://fingerbank.org)
_______________________________________________
PacketFence-devel mailing list
PacketFence-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-devel