Hi Olivier, thanks for that. Can you please tell me, do you have any new Perl CPAN module dependencies?
Thanks Philipp Am 21.09.2011 23:33, schrieb Olivier Bilodeau: > The Inverse Team is pleased to announce the immediate availability of > PacketFence 3.0. This is a major release bringing new hardware support, > several shiny new features, enhancements, bug fixes and updated > translations. This release is considered ready for production use. > > === What is PacketFence ? === > > PacketFence is a fully supported, trusted, Free and Open Source network > access control (NAC) system. Boosting an impressive feature set including: > > * Registration and remediation through a captive portal > * Detection of abnormal network activities using Snort IDS > * Proactive vulnerability scans using Nessus > * Isolation of problematic devices > * 802.1X for wired and wireless networks > * Wireless integration for all provided features > * Supports complex and heterogeneous environments > * VoIP / IP Telephony support and more! > > A set of screenshots is available from > http://www.packetfence.org/tour/screenshots.html and a set of videos is > available from http://www.packetfence.org/tour/videos.html > > === Important upgrade notice === > > * BACKUP YOUR /usr/local/pf/ BEFORE UPGRADING. Several paths have > changed with this release and an RPM upgrade will REMOVE your templates > and remediation pages. See UPGRADE for more information. > * Removed the central concept of mode (ARP, DHCP or VLAN). PacketFence > can now operate in multiple modes simultaneously. This new concept is > called enforcement and is specified per interface in pf.conf. This > affects the default configuration for all installation. Reading the > UPGRADE file is recommended. > * Removed support for Apache prior to version 2.2.0 (#828) > * Removed support for jpgraph 1.x, 2.x which bumps our dependency to > PHP 5.1 > > === Changes Since Previous Release === > > In a nutshell, we have a redesigned captive portal, complete guest > management including self-registration of devices by email activation or > SMS and pre-registered guest creation by administrators. Also added a > new feature to allow PacketFence to secure network access on > unmanageable (consumer) devices (so-called inline enforcement). > Bandwidth tracking with RADIUS accounting, RedHat Enterprise Linux > (RHEL) / CentOS 6 support and several usability improvements are in > there as well. Finally we took the big three-point-ohh opportunity to > fix several things that annoyed us but that were breaking changes. > > Here are the gory details: > > New Hardware Support > * Avaya/Nortel switches now support the floating network device feature > * Avaya Wireless Controller support > * Dlink DWL Access-Point support > * LG-Ericsson iPecs 4500 support for port-security and MAC > Authentication/802.1X > * Netgear FGS Series support for port-security > > New features > * Major update to the captive portal look and feel! More modern and > professional. Cleaner XHTML/CSS makes customization a lot easier than > before. Also, all user-visible URLs are now clean and short (no more > cgi-bin/... clutter). (#980, #982, #1114) > * Flexible guest handling (covering temporary passwords, > self-registration, pre-registration, extension API, etc.) > * Introduced in-line support: firewall based access control with > captive portal. Use this complementary technique when you cannot use > VLAN enforcement. (#1227) > * Ability to view log files from the Web Administration interface (#1080) > * PacketFence now takes care of the local firewall configuration on the > server > * Captive portal authentication modules are versioned, validated on > startup and have customizable names > * New default_auth parameter will be the default authentication module > selected if you have multiple authentication back-end enabled in auth > * Simplification of the captive portal translation (#822, #1114) > * RADIUS Accounting for tracking node bandwidth usage > * RedHat Enterprise Linux 6 / CentOS 6 support (#1244) > * Snort 2.9.x support > > Enhancements > * Captive portal usability improvements for both users and administrators > * pfcmd and web administration performance improvements by avoiding > duplicate loading of some configuration files > * Configuration simplification (#1051, #1182) > * FreeRADIUS package now does the certificate boostrapping process (#1226) > * Named isolation and registration zones now automatically generated on > startup based on networks.conf's DNS entry (#1105) > * Simplified Apache configuration > * Improved installer.pl and configurator.pl > * Included the jpgraph PHP library. Simplifies installation from source. > * More start-up validation in `pfcmd checkup` (#1031, #1191, #1252) > * Improved error-handling, reduced number of Perl warnings, added tests > (#1266) > * Improved Filesystem Hierarchy Standard (FHS) compliance (#762) > * Improves PHP 5.3.x support, relates to distro portability too (#1211, > #1244, #1251: Thanks to Philipp Snizek) > * Migrated bin/flip.pl into a bin/pfcmd_vlan subcommand > * Added ldap port option to Web Admin LDAP (AD) authentication > * New controllerIp network device parameter will make it simpler to > support wireless hardware working in bridged mode > * New DHCP fingerprints for Mac OS X Lion, Fedora 14, Polycom, Aastra, > LifeSize, Nortel, Polycom and Snom Conferencing and VoIP, Ubuntu 11.04, > Belkin Wireless Router, HP ProCurve switches, Androids, Zebra, Kyocera, > HP and Xerox printers, NEC Projectors, Polycom Video Conferencing and > Paradox Card Access module > * Developer documentation to add Floating Network Devices support to > switches > * Minor usability improvements > > Bug fixes > * Fixed issues with several switches if node MAC address falls into an > Hex to ASCII printable range (#1098) > * Renaming Nortel ERS modules (#1238) > * Fixed Avaya/Nortel switches problems on ERS2500 / ERS4500 (at least) > * Fixed OS violations regression introduced in 2.2.0 > * Fixed nessus scans don't work with bin/pfcmd as a setuid/setgid (#1087) > * Fixed custom VLAN assignments relying on connection_type failing on > "unknown" nodes (#1231) > * Fixed problematic default grace period for System scan violation > * Fixed configurator.pl does not show interfaces without IP address (#1221) > * Fixed issue to detect the shell prompt MeruOS 4.1 or greater (#1232) > * Fixed issues with wireless hardware not sending a NAS-Port parameter > (#1229) > * Fixed Apache configuration problems on non RHEL / CentOS platforms > * Fixed other cases of warnings from our FreeRADIUS module > * jpgraph version bump to 3.0.7. Fixes RHEL 6 issues. (#1244) > * Fixed silent failure when deleting a person with associated nodes (#1265) > * Fixed encoding issues in the captive portal (#1115) > * Fixed redirect loop on the captive portal if VLAN reassignment failed > (#1260) > * Fixes issues with accentuated characters and single quotes in some > captive portal strings > * Fixed accidental stop/restart of services because administrative > where done in GET instead of POST (#1119) > * Fixed help not visible in the Web Admin when using Internet Explorer > (#1256) > * Fixed missing exportation icon in the Web Admin when using Internet > Explorer (#1255) > * Cisco C3560 now heritates the Cisco C2960 code > * Fixed distro portability problems (#1185, #1187, #1248) > * Fixed snort pidpath (#1258) > * Additional fixes to nessus scans > * Interim fixes (#1239, #1240, #1263, #1268, #1269) > * Missing "named" in the pfcmd help > > Translations > * Updated Spanish (es) translation (Thanks to Juan Camilo Valencia) > > ... and more. See the ChangeLog file for the complete list of changes > and the UPGRADE file for notes about upgrading. Both files are in the > PacketFence distribution. > > === Getting PacketFence === > > PacketFence is free software and is distributed under the GNU GPL. As > such, you are free to download and try it by either getting the new > release from: > > http://www.packetfence.org/download/releases.html > > or by getting the sources from the official monotone server using the > instructions at > http://www.packetfence.org/development/source_code_repository.html > > Documentation about the installation and configuration of PacketFence is > available from: > > http://www.packetfence.org/documentation/ > > === How Can I Help ? === > > PacketFence is a collaborative effort in order to create the best Free > and Open Source NAC solution. There are multiple ways you can contribute > to the project: > > * Documentation reviews, enhancements and translations > * Feature requests or by sharing your ideas > * Participate in the discussion on mailing lists > (http://www.packetfence.org/support/community.html) > * Patches for bugs or enhancements > * Provide new translations of remediation pages > > === Getting Support === > > For any questions, do not hesitate to contact us by writing to > [email protected] > > You can also fill our online form > (http://www.inverse.ca/about/contact.html) and a representative from > Inverse will contact you. > > Inverse offers professional services to organizations willing to secure > their wired and wireless networks with the PacketFence solution. > > We told you our next release was going to be big! Have fun with this one > and let us know how it goes! ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
