Download PacketFence 3.1.0

Spread the love

An NAC system can be used to secure a network environment. This allows network devices to be automatically blocked, based on pre-set policies, if an undesirable situation occurs. Think of unknown network devices of visitors, a worm that is trying to spread or an authorized device that is equipped with a different operating system via a boot flop or live CD. PacketFence is one such nac system with support for 802.1x and vlan isolation, which allows a network device to be placed in the correct vlan after analysis. For more information, please refer to this page and to the 32nd [IN]SECURE Magazine in which an article about this package can be found. The developers have released version 3.1.0 with the following announcement:

PacketFence 3.1.0 released

This is a major release with big features, new hardware support, enhancements, bug fixes and updated translations.

Ready for production use.

Here are the changes since 3.1.0:

New Hardware Support

  • Stacked Cisco 3750 in MAC-Auth or 802.1X
  • AeroHIVE, Aruba and Motorola support RADIUS Disconnect (RFC3576) to perform de-authentication

New Features

  • Statement of Health (SoH) support for reliable client-side policy compliance through 802.1X
  • Detection of rogue DHCP Servers even behind relays (#1151)
  • RFC3576 (RADIUS Change of Authorization / Disconnect) support added
  • Preview support for wired port bounce on Cisco through CoA (RFC3576). Disabled by default.
  • Wireless profile provisioning for iPhone, iPods, and iPads devices
  • SNMP trap rate limiting mechanism
  • New graphs in the web admin UI — replaced jpgraph (PHP) by gRaphael (JavaScript)

Enhancements

  • Using HTTP Return Code 501 “Not Implemented” for more effective client blocking
  • Startup performance improvements
  • Added support for session-keyfile introduced in BIND 9.7 (#1257)
  • Several improvements in the dhcp_dumper.pl addon
  • Global option to disable rogue DHCP server detection
  • Performance improvements to pfdhcplistener
  • More startup validation on SNMPv3 Trap configuration
  • CentOS 6.2 support
  • Several new HTTP User-Agents detected
  • Several new DHCP fingerprints (from our spinoff www.fingerbank.org)
  • Better support of WISPr (captive portal detection)
  • Configuration flag to disable the captive portal’s network detection feature
  • Added support for months in normalize_time (#1291)

Bug Fixes

  • Slashes (/) not allowed in person id (#1322)
  • Inline: isolation not properly enforced by firewall if registration is disabled (#1330)
  • Several small fixes in pfdhcplistener
  • Inline: NAT out behavior of PacketFence was changed for the best
  • Keep IP to MAC associations across restarts (#1343)
  • Interface enforcement is now configurable through Web UI / CLI (#1335)
  • Violation charts now show proper values
  • Captive portal error “0” when no password is provided
  • Local SNMP Trap handler now configured by default
  • Years are now 365 days!
  • Interim fixes: #1349

translations

  • New Hebrew (he_IL) translation (Thanks to Ereli)
  • Updated Brazilian Portuguese (pt_BR) translation (Thanks to Diego de Souza Lopes and Mauricio Lopes)

…and more. See the ChangeLog file for the complete list of changes and the UPGRADE file for notes about upgrading. Both files are in the PacketFence distribution.

Happy upgrading!

Version number 3.1.0
Release status Final
Operating systems Linux
Website Inverse
Download
License type GPL
You might also like