en-US
search-icon

Secure Mobile Access (SMA) Appliances

SonicWall SMA is a unified secure access gateway that enables organization to provide anytime, anywhere and any device access to any application. SMA’s granular access control policy engine, context aware device authorization, application level VPN and advanced authentication with single sign-on enables organizations to move to the cloud with ease, and embrace BYOD and mobility in a hybrid IT environment.

Watch the Video >
Secure Mobile Access Appliances Product Image

Simple, policy enforced secure access to network and cloud resources

SonicWall SMA is a unified secure access gateway that enables organization to provide anytime, anywhere and any device access to any application. SMA’s granular access control policy engine, context aware device authorization, application level VPN and advanced authentication with single sign-on enables organizations to move to the cloud with ease, and embrace BYOD and mobility in a hybrid IT environment.

Watch the Video >

Legend: (•) — Available,  (-) — Not Available,  (n/a) — Not Applicable

_productName 200 400 500v 6200 7200 9000 8200v
Max concurrent user sessions Performance 50 250 250 2000 10000 20000 5000
Max SSL/TLS throughput Performance 100 Mbps 368 Mbps 186 Mbps 400 Mbps 3.75 Gbps 3.75 Gbps 1.58 Gbps
Layer 3 tunnel Client Access
Split-tunnel and redirect-all Client Access
Auto ESP encapsulation Client Access - - -
HTML5 (RDP, VNC,ICA, SSH, Telnet, Network Explorer) Client Access
Secure Network Detection (SND) Client Access - - -
File browser (CIFS/NFS) Client Access
Citrix XenDesktop/XenApp Client Access
VMware View Client Access - - -
On Demand tunnel Client Access - - -
Chrome/Firefox extensions Client Access - - -
CLI tunnel support Client Access - - -
Mobile Connect (iOS, Android, Chrome, Win 10, Mac OSX) Client Access
Net Extender (Windows, Linux) Client Access - - - -
Connect Tunnel (Windows, Mac OSX, Linux) Client Access - - -
Exchange ActiveSync Client Access
Per app VPN Mobile Access - - -
App control enforcement Mobile Access - - -
App ID validation Mobile Access - - -
Branding User Portal
Customization User Portal - - -
Localization User Portal
User defined bookmarks User Portal
Custom URL support User Portal
SaaS application support User Portal - - -
FIPS 140-2 Security - - - -
ICSA SSL-TLS Security - - -
Suite B ciphers Security - - -
Dynamic EPC interrogation Security
Role Based Access Control (RBAC) Security - - -
Endpoint registration Security
Capture anti malware protection Security - - -
Endpoint quarantine Security
OSCP CRL validation Security - - -
Cipher selection Security - - -
PKI and client certificates Security
Geo IP filter Security - - - -
Botnet filter Security - - - -
Forward proxy Security
Reverse proxy   Security
SAML 2.0 Authentication and Identity services - - -
LDAP, RADIUS Authentication and Identity services
Kerberos (KDC) Authentication and Identity services
NTLM Authentication and Identity services
SAML IdP gatekeeper Authentication and Identity services - - -
Biometric device support Authentication and Identity services
Chained authentication Authentication and Identity services - - -
Two-factor authentication (2FA) Authentication and Identity services
Multi-factor authentication (MFA) Authentication and Identity services - - -
One Time Passcode (OTP) issuance Authentication and Identity services - - -
Common Access Card (CAC) support Authentication and Identity services - - -
X.509 certificate support Authentication and Identity services
Captcha integration Authentication and Identity services - - -
Remote password change Authentication and Identity services
Federated SSO Authentication and Identity services - - -
Forms based SSO Authentication and Identity services
Session persistence Authentication and Identity services - - -
Auto logon Authentication and Identity services
Group AD Access Control
LDAP attributes Access Control - - -
Geolocation policies Access Control - - - -
Continual endpoint monitoring Access Control
Management interface (ethernet) Management - - -
Management interface (console) Management - - -
HTTPS administration Management
SSH administration Management - - -
SNMP MIBS Management
Syslog and NTP Management
Usage monitoring Management
Configuration rollback Management
Centralized management Management - - -
Centralized reporting Management - - -
Management REST APIs Management - - -
Authentication REST APIs Management - - -
RADIUS accounting Management - - -
Scheduled tasks Management - - -
Centralized session licensing Management - - -
Event-driven auditing Management - - -
IPv6 Networking
Global load balancing Networking - - -
Server load balancing Networking - - - -
TCP state replication Networking
Cluster state failover Networking - - -
Active/passive high availability Networking -
Active/active high availability Networking - - -
Horizontal scalability Networking - - -
Single or multiple FQDNs Networking - - -
L3-7 smart tunnel proxy Networking
L7 application proxy Networking
EMM and MDM product support Integration - - -
SIEM product support Integration - - -
TPAM password vault Integration - - -
ESX hypervisor Support Integration n/a n/a n/a n/a n/a
Hyper V hypervisor Support Integration n/a n/a - n/a n/a n/a
Subscription based license Licensing Options - - -
Perpetual license with support Licensing Options
Web Application Firewall (WAF) Licensing Options - - - -
Spike licensing Licensing Options
Tiered licensing Licensing Options - - -
Virtual assist Licensing Options - - - -
Form factor Attributes 1U 1U n/a 1U 1U 2U n/a
Dimensions Attributes 16.92 x 10.23 x 1.75 in (43x26x4.5cm) 16.92 x 10.23 x 1.75 in (43x26x4.5cm) n/a 17.0 x 16.5 x 1.75 in (43 x 41.5x 4.5 cm) 17.0 x 16.5 x 1.75 in (43 x 41.5x 4.5 cm) 27.0 x 18.9 x 3.4 in (68.6 x 48.2x 8.8 cm) n/a
Applaince weight Attributes 11 lbs (5 kgs) 11 lbs (5 kgs) n/a 16 lbs (7.3 kgs) 18.3 lbs (8.3 kgs) 49.1 lbs (22.3 kgs) n/a
Encryption data acceleration (AES-NI) Attributes - - -
Dedicated management port Attributes - - -
SSL acceleration Attributes - - -
Storage Attributes 2GB (Flash memory) 2GB (Flash memory) n/a 2 X 500 GB SATA 2 X 500 GB SATA 2 X 2TB SATA n/a
Interfaces Attributes (2) GB Ethernet, (2) USB, (1) console (4) GB Ethernet, (2) USB, (1) console n/a 6 (6-port 1GE) 8 (6-port 1GE + 2-port 10Gb SFP+) 12 (8-port 1GE + 4-port 10Gb SFP+) n/a
Memory Attributes 2GB 4GB 2GB 8GB 16GB 32 GB 8GB
TPM chip Attributes - - n/a n/a
Processor Attributes 2 cores 4 cores 1 core 4 cores 4 cores 2 X 4 cores 4 cores
MTBF (@ 25°C or 77°F) in hours Attributes 61815 60151 n/a 200064 233892 129489 n/a
Power Attributes Fixed power supply Fixed power supply n/a Fixed power supply Dual power supply, hot swappable Dual power supply, hot swappable n/a
Input rating Attributes 100-240VAC, 50-60MHz 100-240VAC, 50-60MHz n/a 100-240 VAC, 1.1 A 100-240 VAC, 1.79 A 100-240 VAC, 2.8.5 A n/a
Power consumption Operations and Compliance 26.9 W 31.9 W n/a 78 W 127 W 320 W n/a
Total heat dissipation Operations and Compliance 92 BTU 109 BTU n/a 266 BTU 432 BTU 1091 BTU n/a
Environmental Operations and Compliance WEEE, EU RoHS, China RoHS WEEE, EU RoHS, China RoHS n/a WEEE, EU RoHS, Chin/ RoHS WEEE, EU RoHS, Chin/ RoHS WEEE, EU RoHS, Chin/ RoHS n/a
Non-operating shock Operations and Compliance 110 g, 2 msec 110 g, 2 msec n/a 110 g, 2 msec 110 g, 2 msec 110 g, 2 msec n/a
Emissions Operations and Compliance FCC, ICES, CE, C-Tick, VCCI; MIC FCC, ICES, CE, C-Tick, VCCI; MIC n/a FCC, ICES, CE, C-Tick, VCCI; MIC FCC, ICES, CE, C-Tick, VCCI; MIC FCC, ICES, CE, C-Tick, VCCI; MIC n/a
Safety Operations and Compliance TUV/GS, UL, CE PSB, CCC, BSMI, CB scheme TUV/GS, UL, CE PSB, CCC, BSMI, CB scheme n/a TUV/GS, UL, CE PSB, CCC, BSMI, CB scheme TUV/GS, UL, CE PSB, CCC, BSMI, CB scheme TUV/GS, UL, CE PSB, CCC, BSMI, CB scheme n/a
Operating temperature Operations and Compliance 0°C to 40°C (32°F to 104° F) 0°C to 40°C (32°F to 104° F) n/a 0°C to 40°C (32°F to 104° F) 0°C to 40°C (32°F to 104° F) 0°C to 40°C (32°F to 104° F) n/a
Close Overview
EMPOWER YOUR MOBILE WORKFORCE Image

EMPOWER YOUR MOBILE WORKFORCE

  • High performance layer-3 SSL VPN
  • Verify device integrity with End Point Control (EPC)
  • Complete application access control using per-app VPN
  • Enable Single Sign-on (SSO) using SAML 2.0  
  • Clientless secure access to resources via HTML5 browser agents
  • Inspect files uploaded into your network in a cloud-based multi-engine sandbox
  • Customize SMA to best suit your needs using powerful APIs
Powerful access control engine Image

Powerful access control engine

Administrators grant or deny access based on organizational policies and set remediation actions when quarantining sessions. ACE object-based policy utilizes elements of network, resource, identity, device, application, data and time.

End point control Image

End point control

End point control (EPC) allows the administrator to enforce granular access control rules based on the health status of the connecting device. EPC interrogation simplifies device profile setup using a comprehensive, predefined list of anti-virus, personal firewall and anti-spyware solutions for Windows, Mac and Linux platforms, including version and applicability of signature file update.

Advanced authentication Image

Advanced authentication

SMA provides simple integrations with industry standard repositories for easy management of user accounts and passwords. User groups can be populated dynamically based on RADIUS, LDAP or Active Directory (AD) authentication repositories, including nested groups. SMA SAML IdP proxy enables single sign-on (SSO) via a single portal to both traditional AD and SaaS cloud resources, while enforcing stacked multifactor authentication for added security.

Superior security Image

Superior security

Stop unknown, zero-day and ransomware attacks at the gateway by scanning the files uploaded to corporate networks with Capture ATP add-on for SMA. In addition, Web Application Firewall, Geo IP Detection and Botnet Protection protect against DDoS, web-based and zombie attacks. Ensure that the highest security stance is maintained for compliance and data protection by utilizing strong SSL/TLS encryptions and supporting regulatory requirements including FIPS 140-2 certification and PCI.

True resilience Image

True resilience

Deliver a high degree of business continuity and scalability. Empower service providers to deliver services with zero downtime and fulfill aggressive SLAs. Provide users a frictionless, zero impact failover with universal session persistence in a global active-active architecture. Increase your remote user count in the event of a disaster, business disruption or seasonal spike, with SonicWall Spike License Packs.