On 6/13/2012 6:10 PM, Olivier Bilodeau wrote:
> == PacketFence 3.4.0 ==
>
> The Inverse Team is pleased to announce the immediate availability of
> PacketFence 3.4.0. This is a major release with new features and
> important bug fixes. This release is considered ready for production use
> and contains a security fix so upgrading to 3.4.0 is advised.
>
> === What is PacketFence ? ===
>
> PacketFence is a fully supported, trusted, Free and Open Source Network
> Access Control (NAC) solution. Boasting an impressive feature set,
> PacketFence can be used to effectively secure small to very large
> heterogeneous networks.
>
> Among the features provided by PacketFence, there are:
>
>   * Powerful BYOD (Bring Your Own Device) workflows
>   * Simple and efficient guests management
>   * Multiple enforcement methods with Role-Based Access Control (RBAC)
>   * Compliance checks for computers present on your network
>   * Integration with various vulnerability scanners and intrusion
> detection solutions
>   * Bandwidth accounting for all devices
>
> A complete overview of the solution is available from
> http://www.packetfence.org/about/overview.html
>
> === Changes Since Previous Release ===
>
> Security
>   * Fixed a reflected cross-site scripting (XSS) vulnerability in Web
> Admin guest management (#1454)
>
> New Hardware
>   * H3C S5120 series supports MAC-Authentication and 802.1X with or
> without VoIP
>   * Added Role support for all Cisco Wireless (WLC) models
>   * Brocade 6400 series supports MAC-Authentication and 802.1X with or
> without VoIP
>   * Brocade RF Switches support (Wireless controller)
>
> New Features
>   * Debian packages (#1066, #1067, #1463)
>   * Support for up to 100 custom VLANs (Defaults to 5 see relevant FAQ
> entry to enable more)
>   * Node bulk importation now allow you to define default values for pid,
> category and voip in pf.conf
>   * New graphics showing bandwidth consumed by os class and the top 25
> bandwidth consumers
>
> Enhancements
>   * Minor refactoring and cleanup
>   * Debian support: arp binary location now configurable
> ([services].arp_binary)
>   * Log the switch IP when a trap is skipped due to a dynamic uplink
> fetch not working
>   * Performance improvements by reducing the number of forked process
> (mostly beneficial to pfdhcplistener)
>   * Captive portal supports being behind an HTTP-based load balancer (see
> captive_portal.loadbalancers_ip config)
>
> Bug Fixes
>   * Fix guest management Inline
>   * RADIUS-based Disconnects not working for Aruba, AeroHIVE. Introduced
> in 3.3.2. (#1437)
>   * Interface configuration errors in the Web Admin (or on the CLI when
> editing the vip field)
>   * Debian support: radiusd is started even if disabled
>   * 'uninitialized value' warnings in checkup phase (pfcmd checkup)
>   * Got rid of the unused (unuseful) logs/pfdhcplistener_<int>  log files.
> See logs/packetfence.log instead.
>   * pfdhcplistener doesn't hang anymore
>   * pid (username) of the form 'domain\\user' are now allowed (#1253)
>   * Guest account import didn't work on files with Windows line
> terminators (\r\n)
>   * configurator.pl fixes in non-english environment (#1418)
>   * Process management fixes (#1464)
>
> Translations
>   * Updated Spanish (es) translation (Thanks to Juan Camilo Valencia)
>   * Updated Dutch (nl) translation (Tnanks to zappo)
>
> ... and more. See the ChangeLog file for the complete list of changes
> and the UPGRADE file for notes about upgrading. Both files are in the
> PacketFence distribution.
>
> === Getting PacketFence ===
>
> PacketFence is free software and is distributed under the GNU GPL. As
> such, you are free to download and try it by either getting the new
> release from:
>
> http://www.packetfence.org/download/releases.html
>
> or by getting the sources from the official monotone server using the
> instructions at
> http://www.packetfence.org/development/source_code_repository.html
>
> Documentation about the installation and configuration of PacketFence is
> available from:
>
> http://www.packetfence.org/documentation/
>
> === How Can I Help ? ===
>
> PacketFence is a collaborative effort in order to create the best Free
> and Open Source NAC solution. There are multiple ways you can contribute
> to the project:
>
>   * Documentation reviews, enhancements and translations
>   * Feature requests or by sharing your ideas
>   * Participate in the discussion on mailing lists
> (http://www.packetfence.org/support/community.html)
>   * Patches for bugs or enhancements
>   * Provide new translations of remediation pages
>
> === Getting Support ===
>
> For any questions, do not hesitate to contact us by writing to
> [email protected]
>
> You can also fill our online form
> (http://www.inverse.ca/about/contact.html) and a representative from
> Inverse will contact you.
>
> Inverse offers professional services to organizations willing to secure
> their wired and wireless networks with the PacketFence solution.
>
> Enjoy our first summer release! I've heard it's best served with sangria.
Just completed the upgrade to 3.4.0.  It went smooth except for one 
minor issue.  There is still something wrong with the packaging for 
packetfence-freeradius2 as documented in the UPGRADE doc for upgrading 
from previous versions 3.3.0 or earlier ( I was on 3.3.2 ).  Somehow the 
SQL connect for freeradius broke.  It wasn't even attempting to connect 
to MySQL to look up clients.  Doing a "yum reinstall 
packetfence-freeradius2" fixes the issue.

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to