My favorites...
* Added the possibility to search by computer name on the nodes page
* Added local account authentication for EAP
* Added ability to create local accounts when registering with external
authentication sources
* Added the possibility to create rules using the username in OAuth
authentication sources
* Verify the user roles level before creating a user via the admin gui
Thank you. I can't wait to implement some of these!
Curtis Larsen
University of Utah
Wireless Network Engineer
________________________________
From: Francis Lachapelle [flachape...@inverse.ca]
Sent: Thursday, September 11, 2014 7:16 AM
To: packetfence-annou...@lists.sourceforge.net;
packetfence-users@lists.sourceforge.net; packetfence-de...@lists.sourceforge.net
Subject: [PacketFence-users] ANN: PacketFence 4.4.0
The Inverse team is pleased to announce the immediate availability of
PacketFence 4.4.0. This is a major release with new features, enhancements and
important bug fixes. This release is considered ready for production use and
upgrading from 4.3.0 is strongly advised.
What is PacketFence?
PacketFence is a fully supported, trusted, Free and Open Source Network Access
Control (NAC) solution. Boasting an impressive feature set, PacketFence can be
used to effectively secure small to very large heterogeneous networks.
Among the features provided by PacketFence, there are:
* Powerful BYOD (Bring Your Own Device) workflows
* Simple and efficient guests management
* Multiple enforcement methods with Role-Based Access Control (RBAC)
* Compliance checks for computers present on your network
* Integration with various vulnerability scanners and intrusion detection
solutions
* Bandwidth accounting for all devices
A complete overview of the solution is available from the official website:
http://www.packetfence.org/about/overview.html
Changes Since Previous Release
New Features
* Added the possibility to search by computer name on the nodes page
*
Added support for the Anyfi WiFi controller
* Show portal profiles directly on the admin gui
* Added local account authentication for EAP
* Added support for unreg date with dynamic year
*
Added support for NetGear FSM7328S switches
* Added new network profile filter
* Added external captive portal support for AeroHIVE
* Added external captive portal support for Xirrus
* Added support for Dynamic Access lists on the Cisco Catalyst 2960
* Added the ability to search switches
* Added support for Dlink DES3028 switches
* Added reuse 802.1x credential on the portal profile
* Added support for Mikrotik access point
* Added ability to create local accounts when registering with external
authentication sources
Enhancements
* Added support to configure either NATting or routed mode for inline layer
2 interfaces from the GUI
* Added informational messages in the GUI for inline interfaces
* Improvement of Inline Layer 3 (Inline L3 can only be defined behind
Inline Layer 2 network)
* pfbandwidthd is now able to capture on all inline interfaces
* Added an option to set the timeout value for LDAP connections in
authentication sources
* FreeRADIUS default configuration should now be more scalable and
resilient to misbehaving devices
* Added the possibility to create rules using the username in OAuth
authentication sources
* Added the RADIUS request to the vlan filter
* Moved from using Storable to Sereal to serialize cached data
* Refactored portal profile filters to make it easier to extend
* Improved support for Dlink DES 3526 switches
* Rewrited log format [] for device mac () for switch "" for userID
* Improve error handling of web api
*
Raised ServerLimit on Apache httpd.portal, lowered httpd.portal Timeout and
KeepAliveTimeout to improve responsiveness under load
* Do not overlay the controllerIp if one is already defined when creating a
switch
* Verify the user roles level before creating a user via the admin gui
* Added test iplogs not closed in pftest
* Remove direct usage of Apache2 modules in captive portal
Bug Fixes
* Fix issue when adding multiple portal profile filters causing the wrong
type to be picked
* Fix issue when a trap is received for a switch that does not implement
parseTrap()
* Fix issue when a role is changed in the administration interface and the
node's access is not reevaluated
* Fix issue when a passthrough is not able to be resolved and would
generate an invalid DNS response
* Fix missing files in logrotate file
* Fix issue when setting a port in trunk on a Cisco Catalyst 3560, 3750 and
3750G would fail
* Fix admin roles for bulk actions for nodes/users
* Fix issue where person was not updated in the database because of a case
(non) match
* Fix send user password by email from the GUI
* Fix backward compatibility issue for gaming-registration that should
redirect to device-registration
* Fix device-registration and status pages that were not accessible in
inline mode when doing high-availability
* Fix filetype of wireless-profile.mobileconfig not being set properly
* Fix issue of iplog entries not being closed
See https://github.com/inverse-inc/packetfence/commits/packetfence-4.4.0 for
the complete change log.
See the UPGRADE file for notes about upgrading:
https://github.com/inverse-inc/packetfence/tree/packetfence-4.4.0/UPGRADE.asciidoc
Getting PacketFence
PacketFence is free software and is distributed under the GNU GPL. As such, you
are free to download and try it by either getting the new release or by getting
the sources: http://www.packetfence.org/development/sourcecode.html
Documentation about the installation and configuration of PacketFence is also
available: http://www.packetfence.org/documentation/
How Can I Help?
PacketFence is a collaborative effort in order to create the best Free and Open
Source NAC solution. There are multiple ways you can contribute to the project:
* Documentation reviews, enhancements and translations
* Feature requests or by sharing your ideas
*
Participate in the discussion on mailing lists
(http://www.packetfence.org/support/community.html)
* Patches for bugs or enhancements
* Provide new translations of remediation pages
Getting Support
For any questions, do not hesitate to contact us by writing to
supp...@inverse.ca<mailto:supp...@inverse.ca>
You can also fill our online form (http://www.inverse.ca/about/contact.html)
and a representative from Inverse will contact you.
Inverse offers professional services to organizations willing to secure their
wired and wireless networks with the PacketFence solution.
------------------------------------------------------------------------------
Want excitement?
Manually upgrade your production database.
When you want reliability, choose Perforce
Perforce version control. Predictably reliable.
http://pubads.g.doubleclick.net/gampad/clk?id=157508191&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users