Download PacketFence 3.3.0
An NAC system can be used to secure a network environment. This allows network devices to be automatically blocked, based on pre-set policies, if an undesirable situation occurs. Think of unknown network devices of visitors, a worm that is trying to spread, or an authorized device that has been supplied with another operating system via a boot flop or live CD. PacketFence is one such nac system with support for 802.1x and vlan isolation, which allows a network device to be placed in the correct vlan after analysis. For more information, please refer to this page and to the 32nd [In]Secure Magazine, in which an article about this package can be found. The developers of Inverse have released version 3.3.0 with the following changes and improvements:
New Hardware
- AlliedTelesis AT8000GS Switches using 802.1x/Mac Authentication without VoIP
- Added 802.1x/Mac Authentication support for HP 2500/2600 switches (no VoIP)
- Cisco WLC/WiSM product line now supports RADIUS Disconnect (RFC3576) to perform de-authentication
New Features
- Introduction of Role-based Access Control. Supported on AeroHIVE, Aruba, Meru and Motorola (considered experimental).
- Wireless deauthentication in Master / Local configuration supported for Aruba controllers (or other Disconnect-Message implementations)
- New guest self-registration mode: Sponsored. Guests accesses are approved through a ‘sponsor’.
- New guest self-registration option: Pre-registered guests. They can register in advance through the portal. Email and sponsor modes supported right now.
Enhancements
- New database-driven custom VLAN assignment strategy example
- Slightly more helpful installer.pl
- Added a virtual IP (vip) parameter for interfaces in configuration which overrides auto-detection (#1396)
- More logging
- Simplified inline mode with DNS rewrite (DNAT). Fixes several issues and annoyances. (#1374, #1387)
- New parameter available to control what information is mandatory to be provided by a guest signing-up (guests_self_registration.mandatory_fields)
- New parameter available to control default field to use as pid for guests (guests_self_registration.guest_pid)
- Node categories were moved from node into configuration on the Web Admin
- New per-category configuration to control maximum number of devices allowed per user (max_nodes_per_pid)
- Daemon startup time logged. Allows for easier troubleshooting or slow-to-restart setups.
- if VoIP is configured to be enabled and the network hardware doesn’t support it, PacketFence will log a warning
- Firewall and Captive Portal more restrictive by default if you are not using guest access
- Performance improvement for the RADIUS accouting (#1414)
- New hook to make it easier to rewrite RADIUS Access-Accept packets
Bug Fixes
- Proxy Bypass issues in environment with Virtual IP (#1385)
- Cisco 2950 802.1X Reauthenticate without VoIP issue (#1388)
- CoA RADIUS secret is lower cased (#1392)
- Username length on the Web Admin is no longer limited to 15 characters
- Potential (not-validated) cross-site scripting (XSS) in captive portal
- Mandatory MAC lookup in the self-registered guests pages
- Cancel button problems on SMS confirmation page (#1393)
- Documented the fact that you need to configure credentials in packetfence-soh.pm for Statement of Health (SoH) support
- Fixed port security + VoIP support for the HP wired product line
- Minor Administration Guide updates
- Fixed CSS for mobile devices
translations
- Updated Brazilian Portuguese (pt_BR) translation
Version number | 3.3.0 |
Release status | Final |
Operating systems | Linux |
Website | Inverse |
Download | |
File size |
8.70MB |
License type | GPL |