

Alternatively, to expedite this procedure, the custom configurations for the network infrastructure devices can be loaded onto physical media, such as Universal Serial Bus (USB) sticks, and then labeled so that the technician will be able to associate each USB stick with its corresponding network infrastructure device. The configuration can implemented manually, whereby the technician will load a configuration tool and then navigate through a series of configuration screen menus until the configuration is complete. One reason for this procedure is that network infrastructure devices are generally associated with a high level of security, and technicians that are on-site at the installation location need to verify that the network infrastructure devices are operating correctly.įor this reason, the technician will typically configure the network infrastructure devices him/herself.

In other words, a technician at the installation location cannot simply connect the network infrastructure device to the data network and expect it to function properly. It is common for network infrastructure devices to be delivered to their installation location without being pre-configured for implementation. Generally, these network infrastructure devices require custom configuration, with each network infrastructure device requiring a configuration that is suitable for its particular implementation. Network infrastructure devices, such as routers or switches, are deployed in various locations to implement network functions pertaining to a data network. Embodiments of the invention relate to configuring a secure network infrastructure device.
