The Inverse team is pleased to announce the immediate availability of 
PacketFence v11.1. This is a major release with new features, enhancements and 
bug fixes. This release is considered ready for production use and upgrading 
from previous versions is strongly advised.
What is PacketFence?
PacketFence is a fully supported, trusted, Free and Open Source Network Access 
Control (NAC) solution. Boasting an impressive feature set, PacketFence can be 
used to effectively secure small to very large heterogeneous networks.

Among the features provided by PacketFence, there are:
powerful BYOD (Bring Your Own Device) capabilities
multiple enforcement methods including Role-Based Access Control (RBAC) and 
hotspot-style
built-in network behaviour anomaly detection
state-of-the art devices identification with Fingerbank
compliance checks for endpoints present on your network
integration with various vulnerability scanners, intrusion detection solutions, 
security agents and firewalls
bandwidth accounting for all devices
A complete overview of the solution is available from the official website: 
https://packetfence.org/about.html
Changes Since Previous Release
New Features
Support for Akamai MFA in VPN/CLI RADIUS authentication and on the captive 
portal
Support for TOTP MFA in VPN/CLI RADIUS authentication and on the captive portal
Automation of upgrades for standalone installations (#6583)
Enhancements
MikroTik DHCP MAC authentication support
Allow to use the sAMAccountName from the searchattributes in MSCHAP machine 
authentication (#6586)
Improve the Data Access Layer to work in MariaDB's default sql_mode
New command pfcmd mariadb [mariadb options]
Deauth request can be made on the previous equipment the device was connected
Allow the bulk import of config items to be async
Remove unused/deprecated sources (AuthorizeNet, Instagram, Twitter, Pinterest, 
and Mirapay) (#6560)
Automation of supported equipment page on PacketFence website (#6611)
Use Venom 1.0.0 through Ansible to run integration tests (#6573)
Import script will migrate the networks configuration if the new IP is in the 
same subnet (#6636)
EAP-TLS integration tests using manual deployment and SCEP protocol (#6647)
Added a monit check to ensure winbindd is still connected (11.1 - AD failover 
doesn’t work #6655)
Improve ZEN builds (#6663)
Bug Fixes
Match the realm more strictly when its not a regex in EAP-TTLS PAP
Populate the LDAP config for enabled LDAP EAP-TTLS PAP realms
Only call oauth2 in authorize for the realms that have an Azure AD EAP-TTLS PAP 
configuration
Use source username in LDAP module for EAP-TTLS PAP instead of always using 
sAMAccoutName
Support LDAP certificate client auth for LDAP EAP-TTLS PAP authentication
Allow to use Google Workspace LDAP sources in EAP-TTLS PAP authentication
Add script for removing WMI scan (#6569)
Fix Let's Encrypt renewal process restarting services even if they are disabled 
(#6606)
Removes the deprecated NTLM background job fields and components (#6552)
Ignore 'Mark as sponsor' administration rules when finding the access level of 
a VPN/CLI user (#6349)
Reducing time balance only when registered
See https://github.com/inverse-inc/packetfence/compare/v11.0.0...v11.1.0 for 
the complete change log.

See the Upgrade guide for notes about upgrading: 
https://packetfence.org/doc/PacketFence_Upgrade_Guide.html
Getting PacketFence
PacketFence is free software and is distributed under the GNU GPL. As such, you 
are free to download and try it by either getting the new release or by getting 
the sources: https://packetfence.org/download.html

Documentation about the installation and configuration of PacketFence is also 
available: https://packetfence.org/support/index.html#/documentation
How Can I Help?
PacketFence is a collaborative effort in order to create the best Free and Open 
Source NAC solution. There are multiple ways you can contribute to the project:
Documentation reviews, enhancements and translations
Feature requests or by sharing your ideas
Participate in the discussion on mailing lists 
(https://packetfence.org/support/index.html#/community)
Patches for bugs or enhancements
Provide new translations of remediation pages
Getting Support
For any questions, do not hesitate to contact us by writing to 
supp...@inverse.ca

You can also fill our online form (https://inverse.ca/#contact) and a 
representative from Inverse will contact you.

Inverse offers professional services to organizations willing to secure their 
wired and wireless networks with the PacketFence solution.

_______________________________________________
PacketFence-devel mailing list
PacketFence-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-devel

Reply via email to