Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.
SMA is available as a physical appliance or as a virtual appliance running on ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.
SonicWall SMA 10.2.2.3 is supported on the following SonicWall appliances:
SMA 500v for ESXi
SMA 500v for HyperV
This release provides the fixes for previously reported issues and the following enhancements.
This section provides a list of resolved issues in this release.
| Issue ID | Issue Description |
|---|---|
| SMA-4696 | The Admin GUI freezes, and the new SSL VPN connection fails when the traffic to generate/renew the Let's Encrypt certificate is blocked. |
| SMA-5400 | The syslog received from SMA shows logs with the source IP that are not detected correctly and conflict with other users. |
| SMA-5467 | EPC check fails with client certificate. |
| SMA-5473 | The SMA event log repeatedly outputs "Xn medium:(null), useMCD=1". |
| SMA-5503 | Citrix Bookmark doesn’t work. |
| SMA-5513 | Error accessing the Citrix desktop from the portal, and we get the error "Desktop could not be started" |
| SMA-5524 | The Get domain attempt timeout problem is caused by a domain list that contains umlauts. |
| SMA-5525 | Throw up an error after hitting bind, and the authentication setup process. |
| SMA-5528 | The “Pie Chart” section is garbled in the Japanese SMA report. |
| SMA-5530 | The sort function for 'Request Time' on the Device Management > Device page is not working correctly. |
| SMA-5559 | The HTTP resource in the Portal bookmark logs the user out after a successful login when any sub-tab is clicked, as the session has expired. |
| SMA-5560 | Garbled subject of Notification mail in Device Management. |
| SMA-5581 | EPC check for the registry key HKEY_CURRENT_USER\Control Panel\Desktop\ScreenSaveTimeOut is not functioning correctly. |
| SMA-5583 | The customer wants the option to display the default file share button showing all network resources for just an individual instead of portal-wide. |
| SMA-5589 | NetExtender with WireGuard loses Internal access after 30 minutes, and a reboot of SMA fixes the issue. |
| SMA-5606 | Client routes are missing while connecting with NetExtender Windows/Linux 10.3.0. |
| SMA-5614 | SMA-1827: Error sending OTP via emails for LDAP users, Error sending One Time password. |
| SMA-5628 | SMA-4966| Geo IP identification & remediation is broken with SMA 10.2.1.14, was fixed in SMA 10.2.1.13. |
| SMA-5637 | When the NTP server is enabled, the system time differs by 2 minutes from the actual time, causing 2FA to fail. |
| SMA-5646 | Post-upgrade the SMA to 10.2.1.14, the following error documentation_url_api shows up in VO & NX. |
| SMA-5687 | The notification email sending history in device management is not output to the log. |
| SMA-5688 | The launch NX option on Virtual Office does not detect 10.3.1 as NX clients and tries to install NX 10.2.341. |
| SMA-5694 | Ftp download via bookmark fails with SMA 10.2.1.14. |
| SMA-5701 | AD authentication fails with Windows Server 2025 when the password is set never to expire. |
| SMA-5736 | Users can log in from multiple machines even though the device management is enabled with OEM. |
| SMA-5762 | Unable to import the certificate and generate the Default Cert. |
| SMA-5763 | SMA uptime status displaying incorrect value in GMS UI. |
| SMA-5775 | Brute force attack on loginChangePass. |
| SMA-5801 | Internal IP address as a log source when blocking the external IP address |
| SMA-5811 | Stack-Based Buffer Overflow Vulnerability. |
| SMA-5812 | Heap-Based Buffer Overflow Vulnerability. |
| SMA-5822 | Reflected XSS (Cross-site Scripting) Vulnerability. |
| SMA-5826 | Unexpected VPN Activity and Logging Inconsistencies on SMA 500 with Geo-IP Blocking Enabled. |
| SMA-5828 | Unable to delete the old certificates that are not used anywhere, they are shown as pending. |
| SMA-5832 | Src IP with multiple login failed are not blocked by brute force attack policy. |
| SMA-5874 | The SAML configuration URLS are being truncated after character limit |
| SMA-5905 | Post-authenticated arbitrary file upload vulnerability. |
Not Applicable.
This section provides a list of additional references in this release.
SMA-5659, SMA-5660, SMA-5699, SMA-5884, SMA-5917.