SMA 100 10.2.1 Release Notes

Version 10.2.1.14

November 2024

About Secure Mobile Access

Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.

SMA is available as a physical appliance or as a virtual appliance running on ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.

Compatibility and Installation Notes

  • Most popular browsers are supported, but Google Chrome is preferred for the real-time graphics display on the dashboard.
  • A MySonicWall account is required.
  • SMA 10.2.1.14 is compatible with Capture Security Center (CSC).
  • CSC provides a cloud dashboard that displays the overall status of all the registered SMA appliances. The dashboard has sliders to choose the Time Period, Count of Alerts, Threats, WAF (Web Application Firewall) Threats, Authentications, VPN Accesses, Bookmark Access, Active devices and Users on a Map, and Threats categories.
  • Use your MySonicWall credentials to log into CSC at https://cloud.sonicwall.com.
  • Click the SMA tile to view the SMA Dashboard, complete registration, and enable cloud management.

SonicWall SMA 10.2.1.14 is supported on the following SonicWall appliances:

  • SMA 200/400
  • SMA 210/410
  • SMA 500v for ESXi
    • Supported for deployment on ESXi 6.0 and higher
  • SMA 500v for HyperV

    • Supported for deployment on Hyper-V server version 2016 and 2019
  • SMA 500v for AWS
  • SMA 500v for Azure
  • SMA 500v for KVM

What's New

  • This release provides the fixes for previously reported issues and security improvements.

Resolved Issues

This section provides a list of resolved issues in this release.

Issue ID Issue Description
SMA-5466 Using the "Message authenticator" attribute is recommended, but user authentication fails.
SMA-5536 Path traversal issue.
SMA-5537 Heap-based buffer overflow issue.
SMA-5538 Stack-based buffer overflow issue.
SMA-5539 Authentication bypass using an Alternate Path or Channel.
SMA-5540 Insecure randomness.
SMA-5567 Stack based buffer overflow issue.

Known Issues

Not Applicable.

Additional References

Not Applicable.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden