talking to myself: yes, you have. At least one. IPTables::libiptc
Am 22.09.2011 09:49, schrieb Philipp Snizek: > Hi Olivier, > > thanks for that. > Can you please tell me, do you have any new Perl CPAN module dependencies? > > Thanks > Philipp > > Am 21.09.2011 23:33, schrieb Olivier Bilodeau: >> The Inverse Team is pleased to announce the immediate availability of >> PacketFence 3.0. This is a major release bringing new hardware support, >> several shiny new features, enhancements, bug fixes and updated >> translations. This release is considered ready for production use. >> >> === What is PacketFence ? === >> >> PacketFence is a fully supported, trusted, Free and Open Source network >> access control (NAC) system. Boosting an impressive feature set including: >> >> * Registration and remediation through a captive portal >> * Detection of abnormal network activities using Snort IDS >> * Proactive vulnerability scans using Nessus >> * Isolation of problematic devices >> * 802.1X for wired and wireless networks >> * Wireless integration for all provided features >> * Supports complex and heterogeneous environments >> * VoIP / IP Telephony support and more! >> >> A set of screenshots is available from >> http://www.packetfence.org/tour/screenshots.html and a set of videos is >> available from http://www.packetfence.org/tour/videos.html >> >> === Important upgrade notice === >> >> * BACKUP YOUR /usr/local/pf/ BEFORE UPGRADING. Several paths have >> changed with this release and an RPM upgrade will REMOVE your templates >> and remediation pages. See UPGRADE for more information. >> * Removed the central concept of mode (ARP, DHCP or VLAN). PacketFence >> can now operate in multiple modes simultaneously. This new concept is >> called enforcement and is specified per interface in pf.conf. This >> affects the default configuration for all installation. Reading the >> UPGRADE file is recommended. >> * Removed support for Apache prior to version 2.2.0 (#828) >> * Removed support for jpgraph 1.x, 2.x which bumps our dependency to >> PHP 5.1 >> >> === Changes Since Previous Release === >> >> In a nutshell, we have a redesigned captive portal, complete guest >> management including self-registration of devices by email activation or >> SMS and pre-registered guest creation by administrators. Also added a >> new feature to allow PacketFence to secure network access on >> unmanageable (consumer) devices (so-called inline enforcement). >> Bandwidth tracking with RADIUS accounting, RedHat Enterprise Linux >> (RHEL) / CentOS 6 support and several usability improvements are in >> there as well. Finally we took the big three-point-ohh opportunity to >> fix several things that annoyed us but that were breaking changes. >> >> Here are the gory details: >> >> New Hardware Support >> * Avaya/Nortel switches now support the floating network device feature >> * Avaya Wireless Controller support >> * Dlink DWL Access-Point support >> * LG-Ericsson iPecs 4500 support for port-security and MAC >> Authentication/802.1X >> * Netgear FGS Series support for port-security >> >> New features >> * Major update to the captive portal look and feel! More modern and >> professional. Cleaner XHTML/CSS makes customization a lot easier than >> before. Also, all user-visible URLs are now clean and short (no more >> cgi-bin/... clutter). (#980, #982, #1114) >> * Flexible guest handling (covering temporary passwords, >> self-registration, pre-registration, extension API, etc.) >> * Introduced in-line support: firewall based access control with >> captive portal. Use this complementary technique when you cannot use >> VLAN enforcement. (#1227) >> * Ability to view log files from the Web Administration interface (#1080) >> * PacketFence now takes care of the local firewall configuration on the >> server >> * Captive portal authentication modules are versioned, validated on >> startup and have customizable names >> * New default_auth parameter will be the default authentication module >> selected if you have multiple authentication back-end enabled in auth >> * Simplification of the captive portal translation (#822, #1114) >> * RADIUS Accounting for tracking node bandwidth usage >> * RedHat Enterprise Linux 6 / CentOS 6 support (#1244) >> * Snort 2.9.x support >> >> Enhancements >> * Captive portal usability improvements for both users and administrators >> * pfcmd and web administration performance improvements by avoiding >> duplicate loading of some configuration files >> * Configuration simplification (#1051, #1182) >> * FreeRADIUS package now does the certificate boostrapping process (#1226) >> * Named isolation and registration zones now automatically generated on >> startup based on networks.conf's DNS entry (#1105) >> * Simplified Apache configuration >> * Improved installer.pl and configurator.pl >> * Included the jpgraph PHP library. Simplifies installation from source. >> * More start-up validation in `pfcmd checkup` (#1031, #1191, #1252) >> * Improved error-handling, reduced number of Perl warnings, added tests >> (#1266) >> * Improved Filesystem Hierarchy Standard (FHS) compliance (#762) >> * Improves PHP 5.3.x support, relates to distro portability too (#1211, >> #1244, #1251: Thanks to Philipp Snizek) >> * Migrated bin/flip.pl into a bin/pfcmd_vlan subcommand >> * Added ldap port option to Web Admin LDAP (AD) authentication >> * New controllerIp network device parameter will make it simpler to >> support wireless hardware working in bridged mode >> * New DHCP fingerprints for Mac OS X Lion, Fedora 14, Polycom, Aastra, >> LifeSize, Nortel, Polycom and Snom Conferencing and VoIP, Ubuntu 11.04, >> Belkin Wireless Router, HP ProCurve switches, Androids, Zebra, Kyocera, >> HP and Xerox printers, NEC Projectors, Polycom Video Conferencing and >> Paradox Card Access module >> * Developer documentation to add Floating Network Devices support to >> switches >> * Minor usability improvements >> >> Bug fixes >> * Fixed issues with several switches if node MAC address falls into an >> Hex to ASCII printable range (#1098) >> * Renaming Nortel ERS modules (#1238) >> * Fixed Avaya/Nortel switches problems on ERS2500 / ERS4500 (at least) >> * Fixed OS violations regression introduced in 2.2.0 >> * Fixed nessus scans don't work with bin/pfcmd as a setuid/setgid (#1087) >> * Fixed custom VLAN assignments relying on connection_type failing on >> "unknown" nodes (#1231) >> * Fixed problematic default grace period for System scan violation >> * Fixed configurator.pl does not show interfaces without IP address >> (#1221) >> * Fixed issue to detect the shell prompt MeruOS 4.1 or greater (#1232) >> * Fixed issues with wireless hardware not sending a NAS-Port parameter >> (#1229) >> * Fixed Apache configuration problems on non RHEL / CentOS platforms >> * Fixed other cases of warnings from our FreeRADIUS module >> * jpgraph version bump to 3.0.7. Fixes RHEL 6 issues. (#1244) >> * Fixed silent failure when deleting a person with associated nodes >> (#1265) >> * Fixed encoding issues in the captive portal (#1115) >> * Fixed redirect loop on the captive portal if VLAN reassignment failed >> (#1260) >> * Fixes issues with accentuated characters and single quotes in some >> captive portal strings >> * Fixed accidental stop/restart of services because administrative >> where done in GET instead of POST (#1119) >> * Fixed help not visible in the Web Admin when using Internet Explorer >> (#1256) >> * Fixed missing exportation icon in the Web Admin when using Internet >> Explorer (#1255) >> * Cisco C3560 now heritates the Cisco C2960 code >> * Fixed distro portability problems (#1185, #1187, #1248) >> * Fixed snort pidpath (#1258) >> * Additional fixes to nessus scans >> * Interim fixes (#1239, #1240, #1263, #1268, #1269) >> * Missing "named" in the pfcmd help >> >> Translations >> * Updated Spanish (es) translation (Thanks to Juan Camilo Valencia) >> >> ... and more. See the ChangeLog file for the complete list of changes >> and the UPGRADE file for notes about upgrading. Both files are in the >> PacketFence distribution. >> >> === Getting PacketFence === >> >> PacketFence is free software and is distributed under the GNU GPL. As >> such, you are free to download and try it by either getting the new >> release from: >> >> http://www.packetfence.org/download/releases.html >> >> or by getting the sources from the official monotone server using the >> instructions at >> http://www.packetfence.org/development/source_code_repository.html >> >> Documentation about the installation and configuration of PacketFence is >> available from: >> >> http://www.packetfence.org/documentation/ >> >> === How Can I Help ? === >> >> PacketFence is a collaborative effort in order to create the best Free >> and Open Source NAC solution. There are multiple ways you can contribute >> to the project: >> >> * Documentation reviews, enhancements and translations >> * Feature requests or by sharing your ideas >> * Participate in the discussion on mailing lists >> (http://www.packetfence.org/support/community.html) >> * Patches for bugs or enhancements >> * Provide new translations of remediation pages >> >> === Getting Support === >> >> For any questions, do not hesitate to contact us by writing to >> [email protected] >> >> You can also fill our online form >> (http://www.inverse.ca/about/contact.html) and a representative from >> Inverse will contact you. >> >> Inverse offers professional services to organizations willing to secure >> their wired and wireless networks with the PacketFence solution. >> >> We told you our next release was going to be big! Have fun with this one >> and let us know how it goes! > > ------------------------------------------------------------------------------ > All the data continuously generated in your IT infrastructure contains a > definitive record of customers, application performance, security > threats, fraudulent activity and more. Splunk takes this data and makes > sense of it. Business sense. IT sense. Common sense. > http://p.sf.net/sfu/splunk-d2dcopy1 > _______________________________________________ > Packetfence-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/packetfence-users ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
