The OpenDNS Hardware Integrations Developer Hub

Welcome to the OpenDNS Hardware Integrations developer hub. You'll find comprehensive guides and documentation to help you start working with OpenDNS Hardware Integrations as quickly as possible, as well as support if you get stuck. Let's jump right in!

Get Started    

Integration for ISR 4K and ISR 1100 – Security Configuration Guide

The Cisco Umbrella integration enables a cloud-based security service by inspecting the Domain Name System (DNS) query that is sent to the enterprise DNS server through the Cisco 4000 Series or 1100 Series Integrated Services Routers (ISR). The security administrator configures Umbrella policies to either allow or deny traffic towards the fully qualified domain name (FQDN). Cisco 4000 Series or 1100 Series ISR acts as a DNS forwarder on the network edge, transparently intercepts DNS traffic, and forwards the DNS queries to the Cisco Umbrella cloud. This feature is available on Cisco IOS XE Denali 16.3 and later releases.

Note: Looking for information on the ISR G2? See ISR G2 – Configuration Guide. You can configure our DNS servers with an ISR G2, but there is no integration with Umbrella.

16.6.1 was released to General Availability in late July 2017. Features have changed and improvements to the internal mapping of IPs have been made. There are significant differences between the command line interfaces; thus, if you are running 16.6.1, see Release Notes for Cisco 4000 Series ISRs, Cisco IOS XE Everest 16.6 and Security Configuration Guide: Cisco Umbrella Integration On Cisco 4000 Series ISRs.

Support for the ISR 1100 Series was made available in February 2018. DNSCrypt on the ISR 1100 requires minimum software version: 16.6.3, 16.7.2, or 16.8.1. The integration for the ISR 1100 is exactly the same as with the 4000 series and should be followed according to the steps for the 4000 series.

Table of Contents

What is a Cisco Umbrella Integration?

The Cisco Umbrella integration feature provides a cloud-based security service by inspecting the DNS query that is sent to an enterprise DNS server through Cisco 4000 and 1100 Series ISRs. When a host initiates the traffic and sends a DNS query, the Cisco 4000 and 1100 Series ISR intercepts and inspects the DNS query. If the DNS query is for a local domain, it forwards without changing the DNS packet to the DNS server in the enterprise network. If the DNS query is for an external domain, it adds an Extended DNS (EDNS) record to the query and sends it to the Cisco Umbrella cloud. An EDNS record includes the device identifier information. Based on this information, the Cisco Umbrella cloud service applies different policies to the DNS query. Cisco Umbrella allows or blocks the request and returns the appropriate IP address in the DNS response.


Before you configure the Cisco Umbrella integration feature on the Cisco 4000 Series ISR, ensure that you have the following:

  • The minimum ROMMON version to load the Cisco IOS Denali 16.2 image on a Cisco 4000 Series ISR is 16.2(1r).
    The Cisco 4000 Series ISR runs the Cisco IOS XE Denali 16.3 software image or later.
  • You can upgrade from any ROMMON version to release 16.2(1r). For more information, see the Upgrading the Device Image to Cisco IOS XE Denali 16.3 section of this guide.
  • The Cisco 4000 Series ISR must have a security K9 license to enable Cisco Umbrella.
  • A valid Cisco Umbrella subscription license.
  • The Cisco 4000 Series ISR should be set as the default DNS server gateway. Ensure that DNS traffic goes through the Cisco 4000 Series ISR.

The following network requirements must be met:

  • For initial registration—The opendns_out interface (this may have a different name if you so choose) must be able to access over port 443 in order to complete initial registration.
  • TCP & UDP on port 53 (DNS) to & (The Cisco Umbrella public DNS resolvers)
  • DNSCrypt—If there are any devices in front of the ISR that may block DNSCrypt for not looking like an actual DNS packet, the DNSCrypt feature may not work. For more information and an example of the problem, see Cisco ASA Firewall blocks DNSCrypt.

Security Blocking and Installing a Certificate on Endpoints

Based on the domain (FQDN) that is being queried, Umbrella determines if the IP addresses should be provided in the response. If the domain is deemed to be malicious or hosting malicious content or blocked by a customized security policy, the IP address of the Umbrella block page server is sent back in the DNS response instead of the IP address of the domain.

When the HTTP client on the host sends an HTTP request to the Umbrella cloud IP address, Umbrella provides the reason for blocking the content in the HTTP response, this is the ‘block page.'

If the blocked domain is from the HTTPS request, the client’s web­ browser displays a certificate error message. The error message is displayed because the Umbrella cloud may not have the certificate from the blocked server.

In order to resolve these issues, we highly recommend installing the Cisco root certificate on your clients. For more information, see Install the Cisco Certificate.

Limitations and Restrictions of the Cisco Umbrella Integration

  • If an application or host makes a direct IP layer connection without using DNS, policy enforcement will not be applied.
  • When the client is connected to a web proxy, the DNS query does not pass through the ISR. In this case, the connector will not be able to detect any DNS request and the connection to the web server will bypass any policy from Cisco Umbrella.
  • Using in conjunction with Cloud Web Security (CWS): When the Cisco Umbrella policy blocks a DNS query, the client is redirected to a Cisco Umbrella block page. HTTPS servers provide these block pages and the IP address range of these block pages is defined by the Cisco Umbrella. These web server addresses should be allowed listed for Cloud Web Security (CWS), so that CWS allows the client to get the blocked page from Cisco Umbrella's web servers.
  • User authentication and identity is not supported in this release.
  • Only queries for A and AAAA record types are redirected to the cloud. Other query types will bypass the connector. However, the TXT type DNS queries to are redirected.
  • IPv6 is not supported in this release for Umbrella block pages or policy enforcement.
  • A maximum of 64 local domains can be configured, and the allowed name length is 100 characters for each of these domains.

When you deploy the Cisco Umbrella integration feature

  • If you use the multiple EDNS options, the Cisco Umbrella policy may not get applied on the device. For the work-around, contact Cisco Technical Support to get the engineering special image which will resolve this issue.
  • If the WAN interface is down for more than 30 minutes, the device may reload with an exception. Disable DNSCrypt to stop this exception. If you do not want to disable DNSCrypt, contact Cisco Technical Support to get the engineering special image which will resolve this issue.

Encrypt the DNS Packet

The DNS packet sent from the Cisco ISR to the Umbrella's servers must be encrypted if the EDNS information in the packet contains information such as user IDs and internal network IP addresses. When the DNS response is sent back from the DNS server, Cisco ISR decrypts the packet and forwards it back to the host.

You can encrypt DNS packets only when the DNSCrypt feature is enabled on the ISR. Based on the FQDN in the DNS query, the Cisco Umbrella service determines if the content provider IP addresses should be provided in the response. If the FQDN is malicious or blocked by the customized enterprise security policy, the Umbrella block web page server address is sent back in the DNS response. When the HTTP client on the host sends an HTTP request to the Umbrella cloud IP address, it provides the reason for blocking the content in the HTTP response.

If the blocked domain is from the HTTPS request, the client’s web browser displays a certificate error message. This error message is displayed because the Umbrella cloud may not have the certificate from the blocked server. The ISR will use the following Anycast recursive Umbrella servers:

  • 2620:119:53::53
  • 2620:119:35::35

Supported and Recommended Configurations for Reporting and Attribution

There are two ways to structure the way DNS traffic is handled with the ISR on the LAN, and both are supported configurations, but only one is recommended. The recommended approach is to use transparent DNS interception and route traffic appropriately with the ISR. This gives the ability to show the IP of the requesting endpoint in Umbrella's reporting, rather than the IP of the internal DNS server. In turn, this makes attribution of the endpoint making the DNS request much easier.

Recommended Configuration

The preferred configuration is to have the endpoint's DNS server be the internal DNS server for the network, but use the ISR to route traffic to either the internal or external DNS resource, based on defined subnet.

If you would like to add the user and group mappings, a VA is required to connect to Active Directory and gather information about the logged in user. The VA sits behind the ISR and is the primary DNS server for all clients. For more information about VAs, see the Virtual Appliance Setup Guide.

Supported but not recommended configuration

Upgrade the Device Image to Cisco IOS XE Denali 16.3

You need to upgrade to the Cisco IOS XE 3.16 version before you upgrade the router image to the Cisco IOS XE Denali 16.3 or later version.

Upgrade the ROMMON

After you upgrade to Cisco IOS XE 3.16 version, upgrade the ROMMON. To upgrade the ROMMON version, download the correct version at Cisco's Software Download page.

For more information, see ISR4K documentation.

  1. Download the rommon image and upload it to flash using tftp, scp, or use a usb key.
  2. Use the upgrade rommonitor filename bootflash command to upgrade the ROMMON.
Device# upgrade rommonitor filename bootflash:rommon_isr_usd_rel_ios_package_SSA.bin16_2_1r R0 Chassis model ISR4321/K9 has a single rommonitor.
Upgrade rommonitor
Target copying rommonitor image file
selected : 0
Booted : 0
Reset Reason: 0
Info: Upgrading entire flash from the rommon package
4259840+0 records in
4259840+0 records out
262144+0 records in
262144+0 records out
655360+0 records in
655360+0 records out
4194304+0 records in
4194304+0 records out
File is a FIPS ROMMON image
FIPS1403 Load Test on has PASSED.
Authenticity of the image has been verified.
Switching to ROM 1
8192+0 records in
8192+0 records out
Upgrade image MD5 signature is b702a0a59a46a20a4924f9b17b8f0887
4259840+0 records in
4259840+0 records out
4194304+0 records in
4194304+0 records out
4194304+0 records in
4194304+0 records out
262144+0 records in
262144+0 records out
Upgrade image MD5 signature verification is b702a0a59a46a20a4924f9b17b8f0887
Switching back to ROM 0
ROMMON upgrade complete.
  1. To make the new ROMMON version as the permanent version, you must restart the RP.
  2. After the upgrade is complete, reload the device. Ensure that you issue the show platform command to verify that the ROMMON upgrade is successful. The firmware version should be 16.2(1r).

Configure Cisco Umbrella

This portion of the document outlines how to configure an ISR to register with the Umbrella dashboard as a Network Device and enforce policy based on Device ID as well as Tags.

The process of registration is fairly straightforward. I​n order to authenticate the ISR to the Cisco Umbrella dashboard, a token must be obtained from your Umbrella dashboard and installed on the ISR.

Then you simply log into the device's command interface and follow the steps below to configure your ISR. Once completed, the ISR will register as a device in your Umbrella dashboard and a policy can then be defined for the ISR or any additional tags.

Cisco Umbrella Tags

A Cisco Umbrella tag is essentially another network that is behind the ISR that can be registered alone and given its own Device ID in the Umbrella dashboard. This can be a VLAN or a physical interface. Each tag will use the same API Token, so minimal extra configuration is needed to register a newly tagged interface. Tags are not unique, but the combination of Model + MAC Address + Tag is unique within an organization.

The screenshot below shows two Network Devices as listed in the Umbrella dashboard. They look like two separate devices but they are the same ISR, just with different interfaces tagged for different VLANs. Tags can be used to auto­-assign policy; this is covered later in this guide.

Obtain API Token from Umbrella

You will need to get your Network Device API Token from your Umbrella dashboard.
Note: You must have administrative rights to the Umbrella dashboard.

  1. Navigate to Admin > API Keys​ and click Create.
  1. Select Legacy Network Devices and click Create.
  1. Expand Legacy Network Devices, and then copy the API token—Your Key—so that you can complete the next steps.
    The API token is a long alphanumeric set of characters.

Configure Cisco Umbrella on the ISR


  • API token from Umbrella
  • Root certificate to establish the HTTPS connection with the Cisco Umbrella registration server.
    Import the root certificate of DigiCert given below into the device using the crypto pki trustpool import terminal command.

Import CA Certificate to the Trust Pool

Communication for device registration to the Umbrella server is through HTTPS. This requires a root certificate to be installed on the router.

While in the Configure Terminal (conf t), run the following commands on your ISR. There are two choices, one of which is to simply import the certificate directly from Cisco.

crypto pki trustpool import url

The second option is to use the import terminal, then paste the certificate and the word quit after it.

To download this certificate directly from a link instead of pasting it in, click here.

The contents of the certificate are also below and can also be copied from this document, although the download is less prone to error.

The commands are listed here first, then with the certificate, then one last step to finalize the upload:

crypto pki trustpool import terminal
% Enter PEM-formatted CA certificate.


% End with a blank line or "quit" on a line by itself.
% PEM files import succeeded.

Verify that the PEM import is successful. You should receive a message after importing the certificate.

Next, while still in Configure Terminal on the ISR (conf t), add the API token to the ISR by running the following commands, substituting the <API TOKEN> variable with your token:

parameter-map type opendns global
token <API TOKEN>

This is the sample configuration:

configure terminal
parameter-map type opendns global
	token AABBA59A0BDE1485C912AFE472952641001EEECC 
	local-domain dns_bypass
	udp-timeout 25 (The range is from 1 to 30 seconds). 
	public-key key (Key should contain only hexadecimal digit). 
	resolver ipv4

If a 400 error is seen when trying to add the API token, verify that the correct token is being used.

Additional configurations listed in the configuration are discussed later in this documentation.

Register the Tag

  1. Configure the OpenDNS parameter map as shown in the previous section.
  2. Configure the OpenDNS Out on the WAN interface:
interface gigabitEthernet 0/0/0
 opendns out
  1. Configure the OpenDNS In on the LAN interface:
interface gigabitEthernet 0/0/1
 opendns in mydevice_tag 

Note: The length of the hostname and OpenDNS tag should not exceed 49 characters.

  1. After you configure the OpenDNS In with a tag using the opendns in mydevice_tag command, the ISR will register the tag to the Cisco Umbrella portal.
  2. The ISR will initiate the registration process by resolving You need to have a name server (ip name-server x.x.x.x) and domain lookup (ip domain-lookup) configured on Cisco ISR to successfully resolve the FQDN.

Note: Configure the OpenDNS Out command before you configure OpenDNS In command. Registration will be successful only when port 443 is in an open state and allows the traffic to pass through the existing firewall.

Configure Internal Domains on Cisco ISR

You can identify the traffic to be bypassed using domain names. This can be useful for directing internal DNS traffic to your local DNS servers. In the Cisco ISR, you can define these domains in the form of a regular expression. If the DNS query that is intercepted by the ISR matches one of the configured regular expressions, then the query is sent to the specified DNS server without redirecting to the Cisco Umbrella cloud.

This sample configuration shows how to define a regex parameter-map with the desired domain name and regular expressions:

Device# configure terminal
Device(config)# parameter-map type regex dns_bypass 
Device(config)# pattern 
Device(config)# pattern .*engineering.fisco.*

_Attach the regex param-map with the OpenDNS global configuration as shown below:_

Device(config)# parameter-map type opendns global 
Device(config-profile)# local-domain dns_bypass

DNSCrypt, Resolver IP, and Public-key

When you configure the parameter-map type opendns global command, the following values are auto-populated:

  • DNSCrypt
  • Resolver IP
  • Public-Key

It is recommended that you only change the above parameters when performing certain tests in the lab. These parameters are reserved for future use. If you modify these parameters, it can affect the normal functioning of the device.

Resolver IP
The following commands will change the redirection of DNS packets from ISR to the Cisco Umbrella cloud:

  • resolver ipv4
  • resolver ipv4
  • resolver ipv6 1234::1
  • resolver ipv6 2345::1

In this example, all the IPv4 DNS packets are redirected to or and IPv6 DNS packets are redirected to 1234::1 or 2345::1. You should remove the IP address to restore to the default values of the resolver. When you modify a resolver IP address, a message is displayed as shown below:

User configured would overwrite defaults
Defaults are restored when no more user configured are present

With the default values of and, all the DNS packets are redirected to the Cisco Umbrella Anycast resolvers. Cisco ISR uses the first default resolver IP address for all its redirection. When the ISR does not receive a response for three consecutive DNS queries, the ISR automatically switches to a different resolver IP address. This behavior remains the same for IPv6 resolver addresses.

Public-key is used to download the DNSCrypt certificate from the Cisco Umbrella cloud. This value is preconfigured to B735:1140:206F:225d:3E2B:d822:D7FD:691e:A1C3:3cc8:D666:8d0c:BE04:bfab:CA43:FB79 which is the public-key of the Cisco Umbrella Anycast servers.
If there is a change in the public-key and if you modify this command, then you have to remove the modified command to restore the default value. If you modify the value, the DNSCrypt certificate download can fail.


DNSCrypt is an encryption protocol to authenticate communications between the Cisco ISR and Cisco Umbrella.

When the parameter-map type opendns is configured and opendns out is enabled on the WAN interface, DNSCrypt is triggered and a certificate downloaded, validated, and parsed. A shared secret key is then negotiated, which is used to encrypt the DNS queries. DNSCrypt downloads this certificate every hour and verifies it for upgrade. As well, a new shared secret key is negotiated to encrypt the DNS queries.

To disable DNSCrypt, use the no dnscrypt command and to re-enable DNSCrypt, use the dnscrypt command. When the DNSCrypt is used, the DNS request packets size will be more than 512 bytes.
Ensure that you allow these packets passage through intermediary devices; otherwise, the response may not reach the intended recipients.

Verify the Cisco Umbrella Configuration

You can verify the Cisco Umbrella configuration using the following commands:

Router# show opendns config

Output example:

Open DNS Configuration ========================
   Token: AAAAAD288BA440D10E207350339F497A001CCBBB
   Local Domain Regex parameter-map name: NONE
   DNSCrypt: Not enabled
   Public-key: NONE
   Timeout: NONE
   Resolver address: NONE
Open DNS Interface Config:
       Number of interfaces with "opendns out" config: 1
         1. GigabitEthernet0/0/1
             Mode     :  OUT
       Number of interfaces with "opendns in" config: 1
         1. GigabitEthernet0/0/0
             Mode     : IN
             Tag      : test1
             Device-id: ...Pending...

Device# show opendns deviceid

Output example:

Device registration details 

Interface Name Tag Status     Device Id
GigabitEthernet0/0/0  test1 REQ QUEUED -
GigabitEthernet0/0/0.1 test498 200 SUCCES 010af8cde579a997
GigabitEthernet0/0/0.2 utah-win-intf 200 SUCCES 010a0a25d20088b8
GigabitEthernet0/0/0.3 utah-win-intf 200 SUCCES 010a0a25d20088b8
GigabitEthernet0/0/0.4 mydevice_tag REQ QUEUED  -

Device#show opendns dnscrypt

Output example:

DNSCrypt: Enabled
Public-key: B735:1140:206F:225D:3E2B:D822:D7FD:691E:A1C3:3CC8:D666:8D0C:BE04:BFAB:CA43:FB79
Certificate Update Status:
     Last Successful Attempt : 10:55:40 UTC Apr 14 2016
     Last Failed Attempt
Certificate Details:
    Certificate Magic : DNSC
    Major Version      : 0x0001
    Minor Version      : 0x0000
    Server Public-key:
: 10:55:10 UTC Apr 14 2016
Query Magic
Serial Number
Start  Time
End Time
 : 0x717744506545635A
: 1435874751
    : 1435874751 (22:05:51 UTC Jul 2 2015)
   : 1467410751 (22:05:51 UTC Jul 1 2016)
Client Public key : 106AE7C2373E5EA68FF90FDA116912D67AF16751F3EEABCB5D8CAAD565D8A44E

Deploy Cisco Umbrella Using Cisco Prime CLI Templates

You can use the Cisco Prime CLI templates to provision the Cisco Umbrella deployment. The Cisco Prime CLI templates make provisioning Cisco Umbrella deployment simple.
Note: The Cisco Prime CLI template is supported only on Cisco Prime version 3.1 or later.

  1. From Cisco Prime Web UI, navigate to Configuration > Templates > Features & Technologies.
  2. Expand Feature Templates > Router Security and select OpenDNS.
  3. Select a template and click Import.
    • OpenDNS—To provision OpenDNS connector on Cisco ISR.
    • OpenDNS Cleanup—to remove previously configured OpenDNS connector on Cisco ISR.

Test Configuration

After the device has been registered, there are some basic and advanced tests that can be performed. These ensure the ISR has been correctly registered and that Umbrella can see traffic coming from the ISR as well as that you can see the ISR and traffic related to it in the Umbrella dashboard.

Note: ​You should use a client that has the IP address of the ISR as its DNS server. In a small “branch office” scenario or in a lab/test environment, this may already be the case; however, in a larger environment, this may not be the case. If necessary, change the DNS server for the client to the ISR in order to generate traffic for these tests.

You can troubleshoot issues that are related to enabling Umbrella feature using these commands:

  • debug opendns device-registration
  • debug opendns config
  • debug opendns dnscrypt

You can run this command from the client device:

  • Use the nslookup -type=txt command from the command prompt of the Windows machine
  • Use the nslookup -type=txt command from the terminal window or shell of the Linux or OS X machine.

The return from either test should include a d​evice​ field in the output. Below is a sample output when the client machine is configured to use Google’s public DNS server.

As you can see below, the Device ID is passed to Umbrella's DNS service in the query yet it still shows the server that was being queried as This shows a perfectly executed DNS hijack by the ISR. If it is NOT intercepting traffic, the results will be much shorter than what’s displayed below.

user$ nslookup type=txt 
Nonauthoritative answer: text = "server" [This is the specific resolver the query ran against] text = "device 010AFE48555956EC" text = "flags 422 0 5040 19FD000780000000000" text = "originid 44491141" text = "orgid 300727" text = "actype 0" text = "bundle 399367" text = "source" [This is the egress IP that Cisco Umbrella saw the query come from]
debug.opendns.comtext = "dnscrypt enabled (717473654A614970)"

Check Block Page

To check that the block page will be returned as expected from a client using the ISR to pass DNS traffic through:

  • Linux or OS X—From the terminal window or shell:
  • Windows—From the command prompt:

In return, you will receive the IP address of the Cisco Umbrella block page:

Non­authoritative answer:

Log into Umbrella for the First Time

Upon first logging into Umbrella, Umbrella displays the Overview report which details traffic from your organization. Traffic can take up to 90 minutes to first begin populating in the dashboard, after which, the reporting should be real-time.

  1. Navigate to Reporting > Core Reports > Activity Search to see the real-­time traffic.
  2. Navigate to Deployments > Core Identities > Network Devices to check whether the ISR has registered as a device in the Umbrella dashboard.
    If successfully registered, the ISR appears here.
  1. Click a Device Name to rename the device.
  2. To delete an entry, hover over a listing and click the Delete trash can icon.

Test Configuration

Once your ISR is configured and appears as a Network Device in Umbrella, any traffic sent from an endpoint device (laptop, workstation, server or any other network­ connected device) behind the ISR will appear in the Umbrella dashboard as Activity.

If internet availability is not a problem, navigate to Reporting > Core Reports > Activity Search.
The traffic from the device to the ISR, then to Cisco Umbrella should appear here as Activity.

To test to see if basic security filtering is already in place, go to​ h​ttp://​ in the browser of your test device.
The website should display a blocked message in the browser if everything is working correctly.

Alternately, running a dig or nslookup against that website from the command line will also generate traffic.

Return to the Umbrella dashboard, click Reporting > Security Activity and run the report. A block for “Phishing” should appear in the report.

Configure Umbrella Policy for the ISR

You can add a new policy or modify the Default policy to suit your needs. Policy creation procedures depend on your Umbrella package. For more information about policies, see documentation specific to your version of Umbrella:

Note: Not all Umbrella features are available to all Umbrella packages. If you encounter a feature described here that you do not have access to, contact your sales representative for more information about your current package. See also, Cisco Umbrella Packages.

When configuring policies:

  • For Umbrella SIG, add a DNS policy.
  • When selecting identities, select Network Devices.

Auto­-attach a Pre­-existing Policy for Future ISRs

A helpful feature is to add a policy for an ISR in advance of that device being added to the Umbrella dashboard. This means that as soon as the device is registered, the policy applied to it will be whatever you’ve configured and there will be no need to manually add the device to an existing policy.

A normal use case is when you have a large number of ISR boxes. Each ISR would register a “guest” and a “corp” tag. We’d want all of those “guest” devices to go into the same “guest” policy.
When a Network Device registers with a tag, the API will check to see if there are any policies with that exact same name (aka Policy Description) as the tag. If such a policy exists, the newly­ registered Network Device will immediately be assigned this policy. The name must match the tag exactly (although it is not case­ sensitive). This process only occurs at the time of registration, so if a policy is created after registration, you will need to assign existing Network Devices to it manually.

Tags are not unique, but the combination of Model + MAC Address + Tag is unique within an organization.

Add, Manage, and Remove ISRs From Umbrella

If you wish to add additional ISRs, simply authenticate these devices with Cisco Umbrella as you've done with the devices that are already present in the dashboard.

The information about a device, such as Serial Number and Device Name can be set by the device itself, but it can be changed in the Umbrella Dashboard in case the Device Name is not helpful or is a duplicate. Where applicable, it's a good idea to include information about the physical location or network address of the device.

To manage the list of devices, use the Filter functionality or group the devices together.

To remove a device, you must remove the authentication (username/password or API token) from the device first or simply take the device offline if you're decommissioning it. Otherwise,
even if it has been deleted from the dashboard, the device will reappear in the dashboard when it sends additional traffic.

Once authentication has been removed from the device, it can be deleted from the dashboard by clicking How to remove this device", then clicking Delete.

Integration for ISR 4K – Security Configuration Guide > Wireless LAN Controller Integration

Integration for ISR 4K and ISR 1100 – Security Configuration Guide

Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.