SMA 100 10.2.1 Release Notes
Version 10.2.1.14
November 2024
About Secure Mobile Access
Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.
SMA is available as a physical appliance or as a virtual appliance running on ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.
Compatibility and Installation Notes
- Most popular browsers are supported, but Google Chrome is preferred for the real-time graphics display on the dashboard.
- A MySonicWall account is required.
- SMA 10.2.1.14 is compatible with Capture Security Center (CSC).
- CSC provides a cloud dashboard that displays the overall status of all the registered SMA appliances. The dashboard has sliders to choose the Time Period, Count of Alerts, Threats, WAF (Web Application Firewall) Threats, Authentications, VPN Accesses, Bookmark Access, Active devices and Users on a Map, and Threats categories.
- Use your MySonicWall credentials to log into CSC at https://cloud.sonicwall.com.
- Click the SMA tile to view the SMA Dashboard, complete registration, and enable cloud management.
SonicWall SMA 10.2.1.14 is supported on the following SonicWall appliances:
- SMA 200/400
- SMA 210/410
- SMA 500v for ESXi
- Supported for deployment on ESXi 6.0 and higher
SMA 500v for HyperV
- Supported for deployment on Hyper-V server version 2016 and 2019
- SMA 500v for AWS
- SMA 500v for Azure
- SMA 500v for KVM
What's New
- This release provides the fixes for previously reported issues and security improvements.
Resolved Issues
This section provides a list of resolved issues in this release.
Issue ID | Issue Description |
---|---|
SMA-5466 | Using the "Message authenticator" attribute is recommended, but user authentication fails. |
SMA-5536 | Path traversal issue. |
SMA-5537 | Heap-based buffer overflow issue. |
SMA-5538 | Stack-based buffer overflow issue. |
SMA-5539 | Authentication bypass using an Alternate Path or Channel. |
SMA-5540 | Insecure randomness. |
SMA-5567 | Stack based buffer overflow issue. |
Known Issues
Not Applicable.
Additional References
Not Applicable.
Was This Article Helpful?
Help us to improve our support portal