SMA 100 10.2.1 Release Notes
Version 10.2.1.1
September 2021
About Secure Mobile Access
Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and mobile malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.
SMA is available as a physical appliance or as a virtual appliance running on VMWare ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.
Compatibility and Installation Notes
- Most popular browsers are supported, but Google Chrome is preferred for the real-time graphics display on the Dashboard.
- A
account is required. -
SMA 10.2.1.1 is compatible with Capture Security Center (CSC).
CSC provides a cloud dashboard that displays the overall status of all the registered SMA appliances. The dashboard has sliders to choose the Time Period, Count of Alerts, Threats, WAF Threats, Authentications, VPN Accesses, Bookmark Access, Active devices and Users on a Map, and Threats categories.
Use your MySonicWall credentials to log into CSC at https://cloud.sonicwall.com.
Click the SMA tile to view the SMA Dashboard, complete registration, and enable cloud management.
SonicWall SMA 10.2.1.1 is supported on the following SonicWall appliances:
200/400 210/410 500v for ESXi - Supported for deployment on VMware ESXi 6.0 and higher
500v for HyperV - Supported for deployment on Hyper-V server version 2016 and 2019
500v for AWS 500v for Azure 500v for KVM
What's New
-
Maintenance fixes provided for issues identified in Resolved Issues
Resolved Issues
This section provides a list of resolved issues in this release.
Issue ID | Issue Description |
---|---|
SMA-1583 | Unable to obtain analytics data from the hypervisor (VMWare, HyperV, Azure, AWS, etc) that is running underneath each 500v instance. |
SMA-2541 | EPC check is executed in the loop for aov session even though the EPC check is failed. |
SMA-2746 | Post upgrading to 10.2.1, CIFS File Share Bookmark does not work as intended. |
SMA-2836 | Get Domain Attempt Timeouts when trying to log in using contemporary mode. |
SMA-2846 | When a network change is detected, the NetExtender with Always On VPN enabled does not reconnect automatically. |
SMA-2847 | Folder download fails when the name of the file in the folder contains un-ascii characters. |
SMA-2851 | Offloaded portal dropped due to HTTP DoS Settings. |
SMA-2854 | Unable to display the frame when "X-Frame-Options" is set to "sameorigin". |
SMA-2856 | Switching back to SMS OTP option in the latest UI always triggers OTP. |
SMA-2859 | When User discretion of OTP is enabled, the settings option in the user portal is not displayed. |
SMA-2861 | Unable to edit user created bookmark in contemporary mode. |
SMA-2866 | Resources are not available in the tab after successful authentication with Azure AD SSO. |
SMA-2867 | Post upgrading to 10.2.0.6, unable to load application offload portal. |
SMA-2892 | An error "Your password has expired" is displayed after upgrading to 10.2.1.0 with NX clients updated to 10.2.313 and unable to connect. |
SMA-2903 | SMA 500v on Azure displays high CPU and memory utilization. |
SMA-2905 | SAML authentication using OKTA fails when failover to backup SMA. |
SMA-2910 | Post upgrading to 10.2.1, the memory usage on the appliance remains at 92% constantly. |
SMA-2912 | Post upgrading SMA 500v ESXi with firmware to 10.2.1.0, appliance crashes. |
SMA-2913 | Post upgrading to 10.2.1.0, NetExtender client address range appears exhausted. |
SMA-2923 | SMTP password fails after restarting the appliance. |
SMA-2939 | When connecting to NetExtender, traffic is displayed as Appliance IP address instead of displaying IP address of the Net extender client. |
SMA-2940 | Prompt to change password does not show up when two factor authentication (2FA) is enabled. |
SMA-2947 | Private IPs are displayed in public facing portal. |
SMA-2949 | Update Signature failed frequently with error message "Update Signature failed, error code 500". |
SMA-2950 | SMA Connect does not launch NetExtender with SAML Authentication. |
SMA-2951 | Backup system does not switch to primary role and unable to take ownership of the IP. |
SMA-2954 | Pcap and netstat results display communication as SMA IP instead of NX IP. |
SMA-2957 | Authenticated SMA100 Arbitrary Command Injection Vulnerability. |
SMA-2959 | Unauthenticated SMA100 Arbitrary File Delete Vulnerability. |
SMA-3002 | Net-SNMP package is vulnerable to insufficient check of NULL pointer (SNMP DoS). |
SMA-3015 | Local Privileged Escalation via Command Injection in HA. |
Known Issues
This section provides a list of known issues in this release.
Issue ID | Issue Description |
---|---|
SMA-2496 | Login uniqueness with 'Confirm logout of existing session' does not work as intended. |
SMA-2904 | Unable to customize url for the custom logo in the SMA portal. |
SMA-2941 | EPC update fails when the attribute option is set to "File System Scanned" after upgrading the appliance to 10.2.10. |
SMA-3001 |
Unable to log in using certificate domain after upgrading appliance from 9.0.0.10-28sv to 10.2.1.1-19sv. Workaround:
|
Upgrading Information
For information about obtaining the latest firmware, upgrading the firmware image on your SonicWall appliance, and importing configuration settings from another appliance, see the SonicWall SMA Upgrade Guide available on the Support portal at https://www.sonicwall.com/support/technical-documentation/.
Was This Article Helpful?
Help us to improve our support portal