Software update: PacketFence 8.0.1

Spread the love

To secure a network environment, a nac system can be used. With this, based on preset policies network devices can be automatically blocked if an undesirable situation occurs. Think of unknown network devices of visitors, a worm that tries to spread or an authorized device that is provided with a different operating system via a boot flop or live CD. Packet Fence is such a nac system, with support for 802.1x and vlan isolation with which a network device can be placed in the right vlan after analysis. The developers have released version 8.0.1 with the following changes:

Version 8.0.1
Enhancements

  • Update the computer name (host name) or a node using the Fingerbank Collector data
  • Detect uplinks based on CDP flag instead of
  • Put etcd in its own directory

Bug Fixes

  • Fixed missing timeout when performing RADIUS SSO (Forti Gate, Check Point, Watch Guard)
  • Fixed issue with API frontend when initially configuring the web services username and password
  • packetfence-haproxy-portal and packetfence-tc systemd service in a wrong target
  • Nessus 6 scanner
  • haproxy-db only listens on IPv6
  • interface (Debian) (# 3208)
  • Fixed packetfence-local-auth
  • Fixed DNS passthrough for normal domains (was considered as a wildcard)
  • Winbind fails to start because of permission issues on / var / run / samba / winbindd in the chroots
  • Update from 7.4 to 8.0 audit log file not there (# 3216)
  • Fixed unreg on RADIUS accounting stop (# 3220)
  • Allow nodes without roles to be modified when restricting allowed role (# 3217) [19659005] Fixed speed issues with node search in the admin
  • Fixed missing timeout for RADIUS sources tests in pfstats

Version 8.0.0
New Features

  • Replaced the ISC DHCP server with a new Golang-based DHCP server (PR # 2911)
  • Now supporting inline enforcement in active / active clusters (PR # 2911)
  • Replaced pfdns with a new Golang-based DNS server (PR # 2911)
  • Allow inline network to split into PacketFence allowing to put specific devices into a distinct broadcast network (PR # 2911)
  • DNS routing (PR # 2911)
  • Dashboard metrics are now based on Netdata (PR # 2935)
  • Traffic shaping support for in-line enforcement (PR # 2803)
  • Added a configuration parameter to allow to unregister a device on an accounting stop (PR # 2685)
  • Added CLI support on Aruba 5400 switches (PR # 2965)
  • Username stripping (removing the realm) is now configurable via the realms
  • PacketFence integration with JAMF API for Apple computers and mobile devices management (PR # 2797)
  • Added to HTTP JSON API

Enhancements

  • Distributed pfdhcplistener tasks among cluster members (PR # 2887) (# 2858)
  • Removed pfsetvlan
  • Now allowing to use the RADIUS accounting cache when in cluster mode

Bug Fixes

  • Guest Portal validate_phone_number check not work (# 2783)
  • A management user can override an account that was not created by him (# 2883)

 

You might also like