• Basics of Cisco Defense Orchestrator
    • Request a CDO Tenant
    • Licenses
    • Secure Device Connector (SDC)
    • Signing in to CDO
    • Migrating to Cisco Security Cloud Sign On Identity Provider
    • Launch CDO from the Cisco Security Cloud Sign On Dashboard
    • Manage Super Admins on Your Tenant
    • Software and Hardware Supported by CDO
    • Browser Support
    • Cisco Defense Orchestrator Platform Maintenance Schedule
    • Tenant Management
    • User Management
    • Active Directory Groups in User Management
    • Create a New CDO User
    • User Roles in Cisco Defense Orchestrator
    • Create a User Record for a User Role
    • Edit a User Record for a User Role
    • Delete a User Record for a User Role
    • View Services Page Information
    • Device and Service Management
      • Changing a Device's IP Address in CDO
      • Changing a Device's Name in CDO
      • Export a List of Devices and Services
      • Export Device Configuration
      • External Links for Devices
        • Create an External Link from your Device
        • Create an External Link to ASDM FDM
        • Create an External Link for Multiple Devices
        • Edit or Delete External Links
        • Edit or Delete External Links for Multiple Devices
      • Bulk Reconnect Devices to CDO
      • Moving Devices Between Tenants
      • Update Meraki MX Connection Credentials
      • Write a Device Note
    • View Inventory Page Information
    • Labels and Filtering
    • Find all Devices that Connect to CDO Using the Same SDC
    • Search
    • Global Search
    • The CDO Command Line Interface
    • Bulk Command Line Interface
    • CLI Macros for Managing Devices
    • Compare ASA Configurations
    • ASA Bulk CLI Use Cases
    • About Restoring a Secure Firewall ASA Configuration
    • ASA Command Line Interface Documentation
    • ASA, Cisco Secure Firewall Cloud Native, and Cisco IOS Device Configuration Files
    • Command Line Interface Documentation
    • Objects
    • Network Objects
    • Application Filter Objects
    • Geolocation Objects
    • DNS Group Objects
    • Certificate Objects
    • Trustpoint Objects
    • Configuring IPsec Proposals
    • Configuring the Global IKE Policy
    • RA VPN Objects
    • AWS Security Groups and Cloud Security Group Objects
    • Security Zone Object
    • Service Objects
    • Security Group Tag Group
    • Syslog Server Objects
    • ASA Time Range Objects
    • URL Objects
    • Reading, Discarding, Checking for, and Deploying Changes
    • Read All Device Configurations
    • Read Configuration Changes from an ASA to CDO
    • Read Configuration Changes from FDM-Managed Device to CDO
    • Read Changes from Cisco IOS or SSH to CDO
    • Preview and Deploy Configuration Changes for All Devices
    • Deploy Configuration Changes from CDO to ASA
    • Deploy Configuration Changes from CDO to FDM-Managed Device
    • Deploy Changes to a device
    • Bulk Deploy Device Configurations
    • Scheduled Automatic Deployments
    • Check for Configuration Changes
    • Discard Changes
    • Out-of-Band Changes on Devices
    • Synchronizing Configurations Between Defense Orchestrator and Device
    • Conflict Detection
    • Automatically Accept Out-of-Band Changes from your Device
    • Resolve Configuration Conflicts
    • Schedule Polling for Device Changes
    • Schedule a Security Database Update
    • Monitoring and Reporting
    • Change Logs
    • ASA Change Log Specifics
    • Change Log Entries after Deploying to an ASA
    • Change Log Entries after Reading Changes from an ASA
    • Change Log Entries after Deploying to FDM-Managed Device
    • Change Log Entries after Reading Changes from an FDM-Managed Device
    • Viewing Change Log Diffs
    • Exporting the Change Log to a CSV File
    • Change Request Management
    • FDM-Managed Device Executive Summary Report
    • Jobs Page
    • Workflows Page
    • Network Address Translation
    • Order of Processing NAT Rules
    • Network Address Translation Wizard
    • Common Use Cases for NAT
    • Onboard Devices and Services
  • Onboard FDM-Managed Devices
  • Onboard ASA Devices
  • Onboard an On-Prem Firewall Management Center
  • Migrate On-Prem Management Center Managed Secure Firewall Threat Defense to Cloud-delivered Firewall Management Center
  • Onboard an Umbrella Organization
  • Onboard Cisco Defense Orchestrator Integrations
  • Onboard Meraki MX Devices
  • Onboard AWS Devices
  • Onboard Duo Admin Panel
  • Upgrade Devices and Services
  • Managing On-Prem Firewall Management Center with Cisco Defense Orchestrator
  • Managing Cisco Secure Firewall Threat Defense Devices with Cloud-delivered Firewall Management Center
  • Managing FDM Devices with Cisco Defense Orchestrator
  • Managing ASA with Cisco Defense Orchestrator
  • Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator
  • Managing Umbrella with Cisco Defense Orchestrator
  • Managing Meraki with Cisco Defense Orchestrator
  • Managing IOS Devices with Cisco Defense Orchestrator
  • Managing AWS with Cisco Defense Orchestrator
  • Managing SSH Devices with Cisco Defense Orchestrator
  • Integrating CDO with Cisco Security Cloud Sign On
  • Virtual Private Network Management
  • Monitor Multi-Factor Authentication Events
  • Cisco Security Analytics and Logging
  • FTD Dashboard
  • Cisco Secure Dynamic Attributes Connector
  • Troubleshooting
  • FAQ and Support
  • CDO Public API
  • Security and Internet Access
  • Open Source and 3rd Party License Attribution
  • Terraform

External Links for Devices

You can create a hyperlink to an external resource and associate it with a device you manage with CDO. You could use this feature to create a convenient link to the local manager of one of your devices (Adaptive Security Device Manager (ASDM) for ASA). You could also use it to link to a search engine, documentation resource, a corporate wiki, or any other URL that you choose. You can associate as many external links with a device as you want. You can also associate the same link with multiple devices at the same time.

The links you create can reach anywhere, but your company's security requirements do not change. For example, if you ordinarily need to be connected to your corporate network, by being on-premises or through a VPN connection to reach a particular URL, those requirements remain. If your company blocks specific URLs, those URLs continue to be blocked. URLs that are not restricted continue to not be restricted.

Location Variable

We have created the {location} variable that you can incorporate in your URLs. This variable will be populated with the IP address of your device. For example,
https://{location}
should reach the ASDM for your ASA or the FDM of your FDM-managed device.
  • Create an External Link from your Device
  • Create an External Link to ASDM FDM
  • Create an External Link for Multiple Devices
  • Edit or Delete External Links
  • Edit or Delete External Links for Multiple Devices
Related Information:
  • Write a Device Note

  • Export a List of Devices and Services


Copyright © 2023, Cisco Systems, Inc. All rights reserved.