SMA 100 10.2.1 Release Notes

Version 10.2.1.10

November 2023

About Secure Mobile Access

Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.

SMA is available as a physical appliance or as a virtual appliance running on VMWare ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.

Compatibility and Installation Notes

  • Most popular browsers are supported, but Google Chrome is preferred for the real-time graphics display on the dashboard.
  • A account is required.
  • SMA 10.2.1.10 is compatible with Capture Security Center (CSC).
  • CSC provides a cloud dashboard that displays the overall status of all the registered SMA appliances. The dashboard has sliders to choose the Time Period, Count of Alerts, Threats, WAF (Web Application Firewall) Threats, Authentications, VPN Accesses, Bookmark Access, Active devices and Users on a Map, and Threats categories.
  • Use your MySonicWall credentials to log into CSC at https://cloud.sonicwall.com.
  • Click the SMA tile to view the SMA Dashboard, complete registration, and enable cloud management.

SMA 10.2.1.10 is supported on the following appliances:

  • 200/400
  • 210/410
  • 500v for ESXi
    • Supported for deployment on VMware ESXi 6.0 and higher
  • 500v for HyperV

    • Supported for deployment on Hyper-V server version 2016 and 2019
  • 500v for AWS
  • 500v for Azure
  • 500v for KVM

What's New

This release provides the following new features, deprecated features, and fixes for previously reported issues.

New Features

These features are introduced in Secure Mobile Access 10.2.1.10 onwards:

  • Customize DNS Settings for the SMA Appliance using Azure/AWS Platform
  • Customize a Default gateway for the SMA Appliance using Azure/AWS Platform
  • Enabling Lockout for Source IP Address.

For more information, refer to the section New features in the SMA100 10.2 Administration Guide.

Deprecated Features

This feature is deprecated in Secure Mobile Access 10.2.1.10 onwards:

  • Deprecate Legacy User Interface (UI).

For more information, refer to the section Deprecated features in the SMA100 10.2 Administration Guide.

Resolved Issues

This section provides a list of resolved issues in this release.

Issue ID Issue Description
SMA-4120 Outdated client-side java script libraries (Jquery) need to upgraded in future releases.
SMA-4187 SMTP password visible in plain text (even with a Read-only account), it should be masked.
SMA-4518 Fails PCI scan issues from SYSNET.
SMA-4557 When the NTP server is enabled, the time is reset by a minute or two, resulting in TOTP connection failures.
SMA-4596 Path based issues.
SMA-4597 Unable to adjust DNS settings on SMA using Azure with or without custom settings.
SMA-4620 Duplicate device showing in device management, because of SMA-4499 issue.
SMA-4625 Login to Virtual Office portal and click in NetExtender to connect, DNS suffix is not pushed to client, direct NetExtender works.
SMA-4656 SMA appliance is inaccessible due to post upgrade firmware from 10.2.1.7-50sv to 10.2.1.8-53sv on SMA 500v Azure platform.
SMA-4661 SMA stops authenticating connection requests and when logging in to the web portal with ERROR = Socket Creation Failed.
SMA-4668 Custom WAF rule cross side scripting causes reboot loop of the httpd process.
SMA-4674 Downloaded NetExtender installer cannot be validated. Ensure connecting to a trusted SSL VPN server and NAC agent issue.
SMA-4675 Httpd process fails device rebooting 10.2.1.9 related to EasyAccess cannot import settings.
SMA-4678 OTP email does not include the subject line information even with [%] entered.
SMA-4679 EPC check fails with Virtual Office with Connect agent version 1.1.46 on SMA 10.2.1.9 version.
SMA-4682 Webshell on a SonicWall virtual SMA - malware analysis.
SMA-4698 Manual sending of event logs fails even if "Email Event Logs to" contains an email address within the email address field.
SMA-4705 License sync fails after post upgrade from 10.2.1.0-17sv to 10.2.1.1-19sv on SMA 500v using KVM platform.
SMA-4713 After upgrade to 10.2.1.9 version, connection to soniclicense.global.sonicwall.com fails.
SMA-4724 Let's Encrypt certificate will not be renewed automatically.
SMA-4759 Authenticated RCE.
SMA-4783 Duplication of AD user leading to MFA bypass in SMA100 appliances.
SMA-4761 Unicode characters including Japanese/Chinese characters are garbled in the OTP message.
SMA-4784 Unable to install and update EPC, sign certificate of EPC Agent has been expired.
SMA-4787 NetExtender Windows cannot validate OPSWAT package and fail to connect.

Additional References

SMA-4702

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden