SMA 100 10.2.1 Release Notes

Version 10.2.1.1

September 2021

About Secure Mobile Access

Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and mobile malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.

SMA is available as a physical appliance or as a virtual appliance running on VMWare ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.

Compatibility and Installation Notes

  • Most popular browsers are supported, but Google Chrome is preferred for the real-time graphics display on the Dashboard.
  • A MySonicWall account is required.
  • SMA 10.2.1.1 is compatible with Capture Security Center (CSC).

    CSC provides a cloud dashboard that displays the overall status of all the registered SMA appliances. The dashboard has sliders to choose the Time Period, Count of Alerts, Threats, WAF Threats, Authentications, VPN Accesses, Bookmark Access, Active devices and Users on a Map, and Threats categories.

    Use your MySonicWall credentials to log into CSC at https://cloud.sonicwall.com.

    Click the SMA tile to view the SMA Dashboard, complete registration, and enable cloud management.

SonicWall SMA 10.2.1.1 is supported on the following SonicWall appliances:

  • SMA 200/400
  • SMA 210/410
  • SMA 500v for ESXi

    • Supported for deployment on VMware ESXi 6.0 and higher
  • SMA 500v for HyperV

    • Supported for deployment on Hyper-V server version 2016 and 2019
  • SMA 500v for AWS
  • SMA 500v for Azure
  • SMA 500v for KVM

What's New

  • Maintenance fixes provided for issues identified in Resolved Issues

Resolved Issues

This section provides a list of resolved issues in this release.

Issue ID Issue Description
SMA-1583 Unable to obtain analytics data from the hypervisor (VMWare, HyperV, Azure, AWS, etc) that is running underneath each 500v instance.
SMA-2541 EPC check is executed in the loop for aov session even though the EPC check is failed.
SMA-2746 Post upgrading to 10.2.1, CIFS File Share Bookmark does not work as intended.
SMA-2836 Get Domain Attempt Timeouts when trying to log in using contemporary mode.
SMA-2846 When a network change is detected, the NetExtender with Always On VPN enabled does not reconnect automatically.
SMA-2847 Folder download fails when the name of the file in the folder contains un-ascii characters.
SMA-2851 Offloaded portal dropped due to HTTP DoS Settings.
SMA-2854 Unable to display the frame when "X-Frame-Options" is set to "sameorigin".
SMA-2856 Switching back to SMS OTP option in the latest UI always triggers OTP.
SMA-2859 When User discretion of OTP is enabled, the settings option in the user portal is not displayed.
SMA-2861 Unable to edit user created bookmark in contemporary mode.
SMA-2866 Resources are not available in the tab after successful authentication with Azure AD SSO.
SMA-2867 Post upgrading to 10.2.0.6, unable to load application offload portal.
SMA-2892 An error "Your password has expired" is displayed after upgrading to 10.2.1.0 with NX clients updated to 10.2.313 and unable to connect.
SMA-2903 SMA 500v on Azure displays high CPU and memory utilization.
SMA-2905 SAML authentication using OKTA fails when failover to backup SMA.
SMA-2910 Post upgrading to 10.2.1, the memory usage on the appliance remains at 92% constantly.
SMA-2912 Post upgrading SMA 500v ESXi with firmware to 10.2.1.0, appliance crashes.
SMA-2913 Post upgrading to 10.2.1.0, NetExtender client address range appears exhausted.
SMA-2923 SMTP password fails after restarting the appliance.
SMA-2939 When connecting to NetExtender, traffic is displayed as Appliance IP address instead of displaying IP address of the Net extender client.
SMA-2940 Prompt to change password does not show up when two factor authentication (2FA) is enabled.
SMA-2947 Private IPs are displayed in public facing portal.
SMA-2949 Update Signature failed frequently with error message "Update Signature failed, error code 500".
SMA-2950 SMA Connect does not launch NetExtender with SAML Authentication.
SMA-2951 Backup system does not switch to primary role and unable to take ownership of the IP.
SMA-2954 Pcap and netstat results display communication as SMA IP instead of NX IP.
SMA-2957 Authenticated SMA100 Arbitrary Command Injection Vulnerability.
SMA-2959 Unauthenticated SMA100 Arbitrary File Delete Vulnerability.
SMA-3002 Net-SNMP package is vulnerable to insufficient check of NULL pointer (SNMP DoS).
SMA-3015 Local Privileged Escalation via Command Injection in HA.

Known Issues

This section provides a list of known issues in this release.

Issue ID Issue Description
SMA-2496 Login uniqueness with 'Confirm logout of existing session' does not work as intended.
SMA-2904 Unable to customize url for the custom logo in the SMA portal.
SMA-2941 EPC update fails when the attribute option is set to "File System Scanned" after upgrading the appliance to 10.2.10.
SMA-3001

Unable to log in using certificate domain after upgrading appliance from 9.0.0.10-28sv to 10.2.1.1-19sv.

Workaround:

  • Disable the TLS 1.3 option

  • Edit the domain and check the trusted CA certificate

Upgrading Information

For information about obtaining the latest firmware, upgrading the firmware image on your SonicWall appliance, and importing configuration settings from another appliance, see the SonicWall SMA Upgrade Guide available on the Support portal at https://www.sonicwall.com/support/technical-documentation/.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden