Computer Services Centre

Indian Institute of Technology Delhi

  • Increase font size
  • Default font size
  • Decrease font size

IITD campus Wifi

Print PDF


  1. The CSC has released the IITD campus Wifi - IITD_WIFI1 and IITD_WIFI2  from April 15,  IITD_WIFI3 from May 12, 2010, and IITD_Guests from November 22, 2010. EDUROAM has been started from October 18, 2013.
  2. The IITD campus Wifi is based on controllers and access points from Aruba Networks. The system consists of 60 outdoor access points based on the new 802.11n standard and about 200 access points based on the 802.11b/g standards. We also have about 20 access points from Motorola which are connected to the IITD WiMAX system.
  3. We use IEEE 802.1x (WPA2 Enterprise) based encryption for security on IITD_WIFI1, IITD_WIFI2, IITD_WiMAX, and IITD_WIFI3. For authentication,  IITD_WIFI1, IITD_WIFI2 and IITD_WiMAX use the  EAP method EAP-TTLS with PAP as the inner-tunnel method. This method is natively supported in Mac OS X and Linux. Many versions of Windows also support it natively. In case this method is not supported in your version of Windows, you may download and install the free SecureW2 version available at the CSC web-page. IITD_WIFI3 uses the EAP method PEAP with MSCHAPv2 as the inner tunnel method which is supported natively on Windows platforms and is commonly available on mobile phones and other hand-held devices. Use of PEAP/MSCHAPv2 will require registration of password with the Microsoft Active Directory.  IITD_Guests is an "Unsecured network" but uses HTTPS authentication based on captive portal technology. EDUROAM has been programmed to use either TTLS/MSCHAPv2 or PEAP/MSCHAPv2.
  4. The RADIUS server for EAP uses the IITD LDAP and Kerberos systems for user authorization and authentication at the back-end. Users can connect to the Wifi network using their LDAP ids and Kerberos passwords. Upon successful authentication, clients are configured using DHCP.
  5. For configuration details in your favourite laptop OS, please follow the links from the Resources menu on the left.
  6. The locations where the Wifi access points have already been installed can be seen here. The progress of the Wifi deployment can be monitored by following this link which will be updated on a daily basis.
  7. Man-in-the-middle attacks and eavesdropping are easiest with wireless networks, so please make sure that you have read the Certificates section and have installed the IITD CA certificate in your Wifi client software.
  8. Please report problems, if any, to
Last Updated on Sunday, 31 August 2014 13:01