This is the official alter log:
New Hardware Support
* SMC TigerStack 6128 L2 back upwardly inwards Port Security (feature sponsored past times Seattle Pacific University)
* HP ProCurve MSM710 Mobility Controller
* Meru Networks MC3000 Wireless Controller
* Juniper EX Series inwards MAC RADIUS (Juniper’s MAC Authentication)
New Features
* Simplification of the Wireless, Wired 802.1X in addition to Wired MAC Authentication configuration. Because of a novel FreeRADIUS module in addition to a Web Service interface, everything is straightaway using touchstone PacketFence proccesses in addition to configuration files.
* VoIP devices ascendency over RADIUS (#1008)
* Proxy interception. PacketFence tin straightaway operate inwards an environs where at that spot is a client-side proxy configured. Check proxy-bypass inwards addons/ for details. (#1035)
* Passthroughs support! You tin straightaway configure PacketFence to allow your users achieve specific websites fifty-fifty if they are inwards registration or isolation. (#772) (feature sponsored past times Shippensburg University)
* New pf::web::custom extension quest to customize the captive portal’s code without the park maintenance burden on upgrades (#1045)
* Bulk importation of nodes through CLI or Admin Web interface
* New parameter inwards switches.conf to repose FreeRADIUS integration
* Optional automatic configuration of FreeRADIUS’ clients using switches.conf (see addons/freeradius-integration/README for details)
* New ‘pending’ condition for node. Allows for a broad hit of captive portal workflows where an administrator approves network access (by email, SMS…)
Enhancements
- New information available inwards Node Lookup (Connection Type, SSID, 802.1X User-Name, …)
- FreeRADIUS module improvements (#1034) in addition to major revamping
- Easier installation procedure using yum groupinstall (#1089)
- Faster Web Services layer running nether mod_perl
- Refactoring of the pf::vlan method names for to a greater extent than meaningful ones
- Removed unnecessary database connections in addition to duplicated code
- 802.1X improvements (#995, #1002)
- General code base of operations improvements, refactoring (#914, #977, #1001, #973)
- Usability improvements (#1006, #820, #1075)
- Migrated to the novel Emerging Threats rules for snort in addition to added rules for botnets, malware, shellcode, trojan in addition to worm past times default (#1102)
- New DHCP fingerprints (HP ProCurve Wireless, Ricoh MFP, Cisco/Linksys, Netgear, D-Link, Trendnet, Belkin Home Wireless Routers, Sony Ericsson, Android, Aruba Access Point, Avaya IP Phone, Gentoo Linux in addition to Fedora Linux 13)
- pfcmd_vlan’s logging is straightaway consistent amongst the balance of the organisation (#874)
- configurator.pl straightaway handles DNS in addition to DHCP basic configuration (#1112)
- Merged Installation in addition to Administration guides into a to a greater extent than coherent document
- New documentation most DHCP in addition to DNS services. Now easier to manage! (#1113)
- New documentation most running inwards a routed environment
- Improved documentation most Snort, Oinkmaster, in addition to log rotation inwards Admin Guide
- Improved documentation on violations (external remediation pages in addition to redirect_url) inwards the Administration Guide
- Captive Portal remediation pages tin survive hosted externally again! (#1024)
- Fixes to the SMC TigerStack 8824M in addition to 8848M modules (see UPGRADE)
- No mistake reporting when trying to alter configuration files amongst bad rights (#1088)
- Violation priorities are straightaway enforced according to documentation (1 = highest)
- Wrong URL inwards the provided oinkmaster.conf (#1101)
- MAC addresses of format xxxx.xxxx.xxxx properly recognized inwards pf::util
Share This :
comment 0 Comments
more_vert