In another example, a non-transitory computer readable medium includes instructions that when executed by one or more processors cause the one or more processors to connect to a seed network device through a first connection, discover through the first connection a plurality of neighboring network devices that neighbor the seed network device, initiate tunneled second connections to the plurality of neighboring network devices through the seed device, commit through the tunneled second connections an activation configuration on each of the plurality of neighboring network devices, each activation configuration being unique to one of the plurality of neighboring network devices, and in response to the committing of the activation configurations, establish a non-tunneled ssh connection to each of the plurality of neighboring network devices.
The details of one or more examples are set forth in the accompanying drawings and the description below. Other features, objects, and advantages will be apparent from the description and drawings, and from the claims.