yum upgrade packetfence --enablerepo=packetfence
and read the UPGRADE.ascidoc

Regards
Fabrice

Le 2015-07-23 02:20, Kishore a écrit :
> Hi all,
>
> How to upgrade packetfence 5.2 to packetfence 5.3 in centos?
>
> Thank you,
>
> ------
> Regards,
>
> Kishore Thapa
> System Administrator,
> The Village,
> United Distribution Nepal Pvt.Ltd.,
> Trade Tower Thapathali
>
>
> -----Original Message-----
> From: packetfence-users-requ...@lists.sourceforge.net
> [mailto:packetfence-users-requ...@lists.sourceforge.net] 
> Sent: Thursday, July 23, 2015 12:44 AM
> To: packetfence-users@lists.sourceforge.net
> Subject: PacketFence-users Digest, Vol 87, Issue 56
>
> Send PacketFence-users mailing list submissions to
>       packetfence-users@lists.sourceforge.net
>
> To subscribe or unsubscribe via the World Wide Web, visit
>       https://lists.sourceforge.net/lists/listinfo/packetfence-users
> or, via email, send a message with subject or body 'help' to
>       packetfence-users-requ...@lists.sourceforge.net
>
> You can reach the person managing the list at
>       packetfence-users-ow...@lists.sourceforge.net
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of PacketFence-users digest..."
>
>
> Today's Topics:
>
>    1. ProCurve 2530 error (Polar Geek)
>    2. Re: Packetfence-ZEN-5-1 bandwidth violation (Louis Munro)
>    3. ANN: PacketFence 5.3.0 (Louis Munro)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Wed, 22 Jul 2015 12:14:00 -0600
> From: "Polar Geek" <polarg...@gmail.com>
> Subject: [PacketFence-users] ProCurve 2530 error
> To: <packetfence-users@lists.sourceforge.net>
> Message-ID: <008d01d0c4aa$3079fdd0$916df970$@gmail.com>
> Content-Type: text/plain; charset="us-ascii"
>
> Hello all,
>
>  
>
> Having a problem getting my 2530's working properly with PacketFence 5.3.0
> on CentOS 6.6. 
>
>  
>
> Currently the switches are sending the Mac Address violation traps and the
> server is receiving them. The server states that it is authorizing the MAC
> Address. (Doesn't Actually happen) It then successfully sets the VLAN of the
> port to the registration VLAN.
>
>  
>
> So my problem is that because it doesn't overwrite the the Mac Address in
> the security table, the connection doesn't progress. The log shows no errors
> that I can find. 
>
>  
>
> Jul 22 11:27:04 pfsetvlan(2) INFO: nb of items in queue: 1; nb of threads
> running: 0 (main::startTrapHandlers)
>
> Jul 22 11:27:04 pfsetvlan(2) INFO: secureMacAddrViolation trap received on
> 10.10.10.8 ifIndex 9 for f0:de:f1:e1:d0:f9 (main::handleTrap)
>
> Jul 22 11:27:04 pfsetvlan(2) INFO: Will try to check on this node's previous
> switch if secured entry needs to be removed. Old Switch IP: 10.10.10.8
> (main::do_port_security)
>
> Jul 22 11:27:04 pfsetvlan(2) INFO: MAC not found on node's previous switch
> secure table or switch inaccessible. (main::do_port_security)
>
> Jul 22 11:27:06 pfsetvlan(2) INFO: [f0:de:f1:e1:d0:f9] is of status unreg;
> belongs into registration VLAN (pf::vlan::getRegistrationVlan)
>
> Jul 22 11:27:06 pfsetvlan(2) INFO: authorizing f0:de:f1:e1:d0:f9 (old entry
> 00:10:02:00:30:04) at new location 10.10.10.8 ifIndex 9 (main::handleTrap)
>
> Jul 22 11:27:06 pfsetvlan(2) INFO: setting VLAN at 10.10.10.8 ifIndex 9 from
> 4000 to 50 (pf::Switch::setVlan)
>
> Jul 22 11:27:06 pfsetvlan(2) INFO: finished (main::cleanupAfterThread)
>
>  
>
>  
>
> I know from working with the switch CLI directly that you can't just specify
> a new Mac Address. It generates the output below.
>
>  
>
> GREENRMSWT24(config)# port-security 7 mac-address f0def1e1d0f9
>
> Too many addresses for port 7.
>
>  
>
> I suspect this is the issue with packetfence unless it is using a different
> command to change the mac address. 
>
>  
>
> Any thoughts or suggestions?
>
> Thanks
>
>  
>
> Paul Taylor
>
> IT Support
> Luther College High School
>
>
>
>  
>
>  
>
>  
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
>
> ------------------------------
>
> Message: 2
> Date: Wed, 22 Jul 2015 14:16:46 -0400
> From: Louis Munro <lmu...@inverse.ca>
> Subject: Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth
>       violation
> To: packetfence-users@lists.sourceforge.net
> Message-ID: <d77ea5d5-ee18-4b7a-871d-91977ce82...@inverse.ca>
> Content-Type: text/plain; charset="windows-1252"
>
> It may not be your config that?s wrong. 
> It may be that the switch is not sending accounting data to PacketFence. 
>
> Have you configured RADIUS accounting on the 2960? 
>
> Regards,
> --
> Louis Munro
> lmu...@inverse.ca  ::  www.inverse.ca 
> +1.514.447.4918 x125  :: +1 (866) 353-6153 x125
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
> (www.packetfence.org)
>
> On Jul 22, 2015, at 1:11 , Hubert Kupper <kup...@uni-landau.de> wrote:
>
>> Hello,
>>
>> I have running Packetfence-ZEN-5-1 fine. I created a test bandwidth 
>> violation of 2MB/Day but nothing happens when a client uses more than 
>> 2MB traffic. The web interface shows "there is not enough data to create 
>> the graph" and violation.log shows only DHCP violations.
>>
>> I added the following line to the Cisco 2960G in switches.conf:
>>
>> deauthMethod=RADIUS
>>
>> In violations.conf:
>>
>> [1100013]
>> desc=Bandwidth Limit test (2MB/day)
>> template=bandwidth_limit
>> #hk090715 trigger=Accounting::BandwidthExpired
>> trigger=Accounting::TOT2MBD
>> window=dynamic
>> enabled=Y
>> actions=trap,log
>> priority=1
>> auto_enable=N
>> whitelisted_categories=
>> vlan=isolation
>>
>>
>> So what is wrong with my config?
>>
>> Best regards,
>> Hubert
>>
>>
> ----------------------------------------------------------------------------
> --
>> _______________________________________________
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> -------------- next part --------------
> An HTML attachment was scrubbed...
>
> ------------------------------
>
> Message: 3
> Date: Wed, 22 Jul 2015 14:58:47 -0400
> From: Louis Munro <lmu...@inverse.ca>
> Subject: [PacketFence-users] ANN: PacketFence 5.3.0
> To: packetfence-users@lists.sourceforge.net,
>       packetfence-annou...@lists.sourceforge.net,
>       packetfence-de...@lists.sourceforge.net
> Message-ID: <3bce48ee-1211-43f1-95a1-5bb5c9c00...@inverse.ca>
> Content-Type: text/plain; charset="windows-1252"
>
> ANNOUNCING: PacketFence 5.3.0
>
> The Inverse team is pleased to announce the immediate availability of
> PacketFence 5.3.0. This is a major release with new features, enhancements
> and important bug fixes. This release is considered ready for production use
> and upgrading from previous versions is strongly advised.
>
> What is PacketFence ?
>
> PacketFence is a fully supported, trusted, Free and Open Source Network
> Access Control (NAC) solution. Boasting an impressive feature set,
> PacketFence can be used to effectively secure small to very large
> heterogeneous networks.
>
> Among the features provided by PacketFence, there are:
>
>       ? powerful BYOD (Bring Your Own Device) capabilities
>       ? state-of-the art devices fingerprinting with Fingerbank
>       ? multiple enforcement methods including Role-Based Access Control
> (RBAC) and hotspot-style
>       ? compliance checks for endpoints present on your network
>       ? integration with various vulnerability scanners, intrusion
> detection solutions, security agents and firewalls
>       ? bandwidth accounting for all devices
>
> A complete overview of the solution is available from the official website:
> http://www.packetfence.org/about/overview.html
>
> Changes Since Previous Release
>
> New Features
>
>       ? Support for Single Sign-On integration with the iboss platform
>       ? Support for web authentication for NATed clients
>       ? Support for MAC Authentication and 802.1x for Alcatel-Lucent
> switches
>       ? Support for the IBM StackSwitch G8052 switch
>
> Enhancements
>
>       ? New Powershell scripts to allow unregistering nodes for disabled
> accounts on Active Directory
>       ? Force a JSON response if the Accept header is set to
> 'application/json'
>       ? Fingerbank processing in pfdhcplistener is now asyncronous using
> the webservices
>       ? Integration of pfconfig commands in bin/pfcmd
>       ? Added web form registration to Ruckus Controllers
>       ? Improved database maintenance script to prevent prolonged locking
> of tables
>       ? Active/Active mode will now send gratuitous ARPs to update routers
> when changing master node
>
> Bug Fixes
>
>       ? Fixed multiple XSS vulnerabilities in the administration GUI
>       ? Fixed incorrect RADIUS realm detection when using windows computer
> authentication
>       ? Fixed an issue with pfdns returning the wrong IP when using
> active/active mode
>       ? Fixed an issue on Debian and Ubuntu where the GUI could not change
> some field values
>       ? Fixed incorrect graphite document root on Ubuntu
>       ? Fixed SMS bug where the list of carriers could be accidentally
> deleted
>
> See https://github.com/inverse-inc/packetfence/commits/packetfence-5.3.0 for
> the complete change log.
>
> See the UPGRADE file for notes about upgrading:
> https://github.com/inverse-inc/packetfence/tree/packetfence-5.3.0/UPGRADE.as
> ciidoc
>
> Getting PacketFence
>
> PacketFence is free software and is distributed under the GNU GPL. As such,
> you are free to download and try it by either getting the new release or by
> getting the sources: http://www.packetfence.org/development/sourcecode.html
>
> Documentation about the installation and configuration of PacketFence is
> also available: http://www.packetfence.org/documentation/
>
> How Can I Help ?
>
> PacketFence is a collaborative effort in order to create the best Free and
> Open Source NAC solution. There are multiple ways you can contribute to the
> project:
>
>       ? Documentation reviews, enhancements and translations
>       ? Feature requests or by sharing your ideas
>       ? Participate in the discussion on mailing lists
> (http://www.packetfence.org/support/community.html)
>       ? Patches for bugs or enhancements
>       ? Provide new translations of remediation pages
>
> Getting Support
>
> For any questions, do not hesitate to contact us by writing to
> supp...@inverse.ca
>
> You can also fill our online form (http://www.inverse.ca/#contact) and a
> representative from Inverse will contact you.
>
> Inverse offers professional services to organizations willing to secure
> their wired and wireless networks with the PacketFence solution.
>
>
> --
> Louis Munro
> lmu...@inverse.ca  ::  www.inverse.ca 
> +1.514.447.4918 x125  :: +1 (866) 353-6153 x125
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
> (www.packetfence.org)
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
>
> ------------------------------
>
> ----------------------------------------------------------------------------
> --
>
>
> ------------------------------
>
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
> End of PacketFence-users Digest, Vol 87, Issue 56
> *************************************************
>
>
> ------------------------------------------------------------------------------
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users


-- 
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org) 

Attachment: 0xF78F957E.asc
Description: application/pgp-keys

------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to