Louis Munro
2015-06-18 20:36:48 UTC
The Inverse team is pleased to announce the immediate availability of PacketFence 5.2.0.
This is a major release with new features, enhancements and important bug fixes.
This release is considered ready for production use and upgrading from previous versions is strongly advised.
What is PacketFence ?
PacketFence is a fully supported, trusted, Free and Open Source Network Access Control (NAC) solution.
Boasting an impressive feature set, PacketFence can be used to effectively secure small to very large heterogeneous networks.
Among the features provided by PacketFence, there are:
powerful BYOD (Bring Your Own Device) capabilities
state-of-the art devices fingerprinting with Fingerbank
multiple enforcement methods including Role-Based Access Control (RBAC) and hotspot-style
compliance checks for endpoints present on your network
integration with various vulnerability scanners, intrusion detection solutions, security agents and firewalls
bandwidth accounting for all devices
A complete overview of the solution is available from the official website: http://www.packetfence.org/about/overview.html
Changes Since Previous Release
New Features
Introducing support for the PacketFence PKI application to manage certificates and authenticate RADIUS using EAP-TLS.
Twitter OAuth is now supported as an authentication source.
New 'portal' interface type to spawn a captive-portal instance on selected interface.
Inline mode now provides an ipset per devices role allowing for better granularity in managing them.
Support for OpenWrt 14.07 with hostapd.
Enhancements
Specific vhost for httpd.portal diagnostics.
Added option to disable logging of sensitive information when failing to execute a command through pf_run.
Support for Meraki APs using web authentication on the cloud controller.
Passwords are now obfuscated in the Switch configuration.
Introduced new 'ports.httpd_portal_modstatus' configuration parameter to limit modstatus to a single virtual host.
Bug Fixes
Allow the usage of an external monitoring database when using an Active/Active cluster.
Validate that a provisioner is not used before deleting it through the administration interface.
Stopped logging database password on schema import failure.
Fixed incorrect error message when an external portal authenticated device hits the unknown state.
See https://github.com/inverse-inc/packetfence/commits/packetfence-5.2.0 for the complete change log.
See the UPGRADE file for notes about upgrading: https://github.com/inverse-inc/packetfence/tree/packetfence-5.2.0/UPGRADE.asciidoc
Getting PacketFence
PacketFence is free software and is distributed under the GNU GPL. As such, you are free to download and try it by either getting the new release or by getting the sources: http://www.packetfence.org/development/sourcecode.html
Documentation about the installation and configuration of PacketFence is also available: http://www.packetfence.org/documentation/
How Can I Help ?
PacketFence is a collaborative effort in order to create the best Free and Open Source NAC solution. There are multiple ways you can contribute to the project:
Documentation reviews, enhancements and translations
Feature requests or by sharing your ideas
Participate in the discussion on mailing lists (http://www.packetfence.org/support/community.html)
Patches for bugs or enhancements
Provide new translations of remediation pages
Getting Support
For any questions, do not hesitate to contact us by writing to ***@inverse.ca
You can also fill our online form (http://www.inverse.ca/#contact) and a representative from Inverse will contact you.
Inverse offers professional services to organizations willing to secure their wired and wireless networks with the PacketFence solution.
--
Louis Munro
***@inverse.ca :: www.inverse.ca
+1.514.447.4918 x125 :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org)
This is a major release with new features, enhancements and important bug fixes.
This release is considered ready for production use and upgrading from previous versions is strongly advised.
What is PacketFence ?
PacketFence is a fully supported, trusted, Free and Open Source Network Access Control (NAC) solution.
Boasting an impressive feature set, PacketFence can be used to effectively secure small to very large heterogeneous networks.
Among the features provided by PacketFence, there are:
powerful BYOD (Bring Your Own Device) capabilities
state-of-the art devices fingerprinting with Fingerbank
multiple enforcement methods including Role-Based Access Control (RBAC) and hotspot-style
compliance checks for endpoints present on your network
integration with various vulnerability scanners, intrusion detection solutions, security agents and firewalls
bandwidth accounting for all devices
A complete overview of the solution is available from the official website: http://www.packetfence.org/about/overview.html
Changes Since Previous Release
New Features
Introducing support for the PacketFence PKI application to manage certificates and authenticate RADIUS using EAP-TLS.
Twitter OAuth is now supported as an authentication source.
New 'portal' interface type to spawn a captive-portal instance on selected interface.
Inline mode now provides an ipset per devices role allowing for better granularity in managing them.
Support for OpenWrt 14.07 with hostapd.
Enhancements
Specific vhost for httpd.portal diagnostics.
Added option to disable logging of sensitive information when failing to execute a command through pf_run.
Support for Meraki APs using web authentication on the cloud controller.
Passwords are now obfuscated in the Switch configuration.
Introduced new 'ports.httpd_portal_modstatus' configuration parameter to limit modstatus to a single virtual host.
Bug Fixes
Allow the usage of an external monitoring database when using an Active/Active cluster.
Validate that a provisioner is not used before deleting it through the administration interface.
Stopped logging database password on schema import failure.
Fixed incorrect error message when an external portal authenticated device hits the unknown state.
See https://github.com/inverse-inc/packetfence/commits/packetfence-5.2.0 for the complete change log.
See the UPGRADE file for notes about upgrading: https://github.com/inverse-inc/packetfence/tree/packetfence-5.2.0/UPGRADE.asciidoc
Getting PacketFence
PacketFence is free software and is distributed under the GNU GPL. As such, you are free to download and try it by either getting the new release or by getting the sources: http://www.packetfence.org/development/sourcecode.html
Documentation about the installation and configuration of PacketFence is also available: http://www.packetfence.org/documentation/
How Can I Help ?
PacketFence is a collaborative effort in order to create the best Free and Open Source NAC solution. There are multiple ways you can contribute to the project:
Documentation reviews, enhancements and translations
Feature requests or by sharing your ideas
Participate in the discussion on mailing lists (http://www.packetfence.org/support/community.html)
Patches for bugs or enhancements
Provide new translations of remediation pages
Getting Support
For any questions, do not hesitate to contact us by writing to ***@inverse.ca
You can also fill our online form (http://www.inverse.ca/#contact) and a representative from Inverse will contact you.
Inverse offers professional services to organizations willing to secure their wired and wireless networks with the PacketFence solution.
--
Louis Munro
***@inverse.ca :: www.inverse.ca
+1.514.447.4918 x125 :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org)