According to an approach for securely deploying and configuring network
devices, a secure introduction connection is established between a
network device being deployed and a registrar. The secure introduction
connection may conform to a secure communications protocol, such as
HTTPS. The registrar provides bootstrap configuration data to the network
device over the secure introduction connection. The bootstrap
configuration data is used to establish a secure management connection
between the network device and a secure management gateway. The secure
management connection may conform to a secure communications protocol,
such as IPsec or HTTPS. The secure management gateway provides
user-specific configuration data and security policy data to the network
device over the secure management connection. The user-specific
configuration data and policy data are used to establish a secure data
connection, such as a Dynamic Multipoint Virtual Private Network (DMVPN)
connection, between the network device and the secure data gateway.