Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.
SMA is available as a physical appliance or as a virtual appliance running on VMWare ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.
SonicWall SMA 10.2.1.11 is supported on the following SonicWall appliances:
SMA 500v for HyperV
This release provides the fixes for previously reported issues.
This section provides a list of resolved issues in this release.
Issue ID | Issue Description |
---|---|
SMA-3904 | No statistics in the WAF monitoring graph for connection count. |
SMA-4716 | Device is unstable. |
SMA-4764 | The bookmarked page in Virtual Office is garbled after upgrading to 10.2.1.9. |
SMA-4789 | When adding a botnet policy in contemporary mode, if the name field contains a space, the policy cannot be saved. |
SMA-4795 | NetExtender user failed to change its initial password due to server response error. |
SMA-4802 | Key pair is not associated with authorized_keys when installing SMA 500v for AWS. |
SMA-4805 | SMA100 MFA Improper access control vulnerability. |
SMA-4820 | Unable to create a WAF rule with the operator field "Contains". |
SMA-4821 | Deleting an invalid syntax login policy fail to delete due to “Get user’s setting failed”. |
SMA-4829 | Both full and partial imports makes the appliance inaccessible. |
SMA-4857 | When EPC fails, the custom messages are not displayed; instead, the default messages are displayed. |
Not Applicable.
Not Applicable.