What is claimed is:1. A system comprising:memory; andone or more processors coupled to the memory, the one or more processors being configured to:connect from the system to a seed network device through a first connection, the seed network device being behind a network address translation device or a firewall relative to the system;discover, through the first connection, a plurality of neighboring network devices that neighbor the seed network device, the plurality of neighboring network devices being behind the network address translation device or the firewall relative to the system;initiate tunneled second connections from the system to the plurality of neighboring network devices through the seed network device;commit, through the tunneled second connections, an activation configuration on each of the plurality of neighboring network devices, each activation configuration being unique to one of the plurality of neighboring network devices; andin response to the committing of each activation configuration, establish a non-tunneled secure shell (ssh) connection from the system to each of the plurality of neighboring network devices.2. The system of claim 1, wherein the one or more processors are configured to discover the plurality of neighboring network devices by using Link Layer Discovery Protocol (LLDP) information on the seed network device.3. The system of claim 1, wherein the one or more processors are configured to discover the plurality of neighboring network devices by receiving a private IP address for at least one of the plurality of neighboring network devices.4. The system of claim 1, wherein the first connection comprises an ssh connection.5. The system of claim 1, wherein the second connections comprise ssh connections.6. The system of claim 1, wherein the one or more processors are further configured to commit a first activation configuration on the seed network device through the first connection.7. The system of claim 1, wherein the one or more processors are further configured automatically model the plurality of neighboring network devices.8. The system of claim 1, wherein the one or more processors are further configured to automatically generate each activation configuration for the plurality of neighboring network devices.9. A method comprising:connecting through a first connection, from a network management system, to a seed network device, the seed network device being behind a network address translation device or a firewall relative to the system;discovering through the first connection, by the network management system, a plurality of neighboring network devices that neighbor the seed network device, the plurality of neighboring network devices being behind the network address translation device or the firewall relative to the system;initiating, by the network management system, second tunneled connections from the network management system to the plurality of neighboring network devices through the seed network device;committing through the second connections, by the network management system, an activation configuration on each of the plurality of neighboring network devices, each activation configuration being unique to one of the plurality of neighboring devices;establishing, by the network management system and in response to the committing of each activation configuration, a non-tunneled secure shell (ssh) connection from the network management system to each of the plurality of neighboring network devices.10. The method of claim 9, wherein the discovering the plurality of neighboring network devices comprises using Link Layer Discovery Protocol (LLDP) information on the seed network device.11. The method of claim 9, wherein the discovering the plurality of neighboring network devices comprises receiving a private IP address for at least one of the plurality of neighboring network device.12. The method of claim 9, wherein the first connection comprises an ssh connection.13. The method of claim 9, wherein the second connections comprise ssh connections.14. The method of claim 9, further comprising committing, by the network management system, a first activation configuration on the seed network device through the first connection.15. The method of claim 9, further comprising automatically modeling, by the network management system, the plurality of neighboring network devices.16. The method of claim 9, further comprising automatically generating, by the network management system, each activation configuration for the plurality of neighboring network devices.17. A non-transitory computer readable medium comprising instructions that when executed by one or more processors cause the one or more processors to:connect from a network management system to a seed network device through a first connection, the seed network device being behind a network address translation device or a firewall relative to the system;discover through the first connection a plurality of neighboring network devices that neighbor the seed network device, the plurality of neighboring network devices being behind the network address translation device or the firewall relative to the system;initiate tunneled second connections from the network management system to the plurality of neighboring network devices through the seed network device;commit through the tunneled second connections an activation configuration on each of the plurality of neighboring network devices, each activation configuration being unique to one of the plurality of neighboring network devices; andin response to the committing of each activation configuration, establish a non-tunneled secure shell (ssh) connection from the network management system to each of the plurality of neighboring network devices.18. The non-transitory computer readable medium of claim 17, wherein the instructions cause the one or more processors to discover the plurality of neighboring network devices by using Link Layer Discovery Protocol (LLDP) information on the seed network device.