Computer Services Centre

Indian Institute of Technology Delhi

  • Increase font size
  • Default font size
  • Decrease font size
Welcome to the Computer Services Centre

Wired 802.1x Configuration Guide for Hostels

E-mail Print PDF

Wired 802.1x Configuration Guide for Hostels


Currently Applicable to Nilgiri, Karakoram, Aravali, Jwala and Vindyachal Hostels

The links given below contain detailed instructions on configuration of 802.1x secured wired network in IITD Hostel Network. They provide information for enabling the dot1x network security and setting authentication and passwords for the wired networks. Use your Kerberos credentials in the username and password fields to configure 802.1x .


Last Updated on Thursday, 21 September 2017 10:12

Revision of IITD Internet Access Policies

E-mail Print PDF
Revision of IITD Internet Access Policies.
Recently, the Institute resolved to liberalise the port restrictions and proxy requirements for IITD Internet. 
Some of the key highlights are:
  • the domain will be the primary domain for IIT Delhi ( is deprecated and may not be supported in future)
  • a revised IIT Delhi IT Policy comprising of (1) The IITD IT Usage Policy (ii) The IITD IT Privacy Policy & (iii) The Network Access & Monitoring policy. (see for details).
  • Port restriction are being removed from all authenticated (802.1x) access points (e.g. IITD_WIFI)
  • Please note that this means users may visit any sites/services. Howeve proper traceability of IP addresses will be maintained and in case of any violation of IITD Policies including illegal downloads of copyrighted content, strict action will be taken which may includes appropriate fines and or suspension of Internet priviliges and or the CSC ID.
  • For unauthenticated Wired Services — Current Proxy Based Access will continue.
  • Guest access is now permitted only through IITD_Secure_GUEST and the unsecured IITD_GUEST/IITD_Guests is being withdrawn.
User Acceptance of Revised Policies
As a part of the implementation process, the administration also approved a revised IIT Delhi IT Policy comprising of (1) The IITD IT Usage Policy (ii) The IITD IT Privacy Policy & (iii) The Network Access & Monitoring policy. As resolved by the Dean's Committee, each user is required to review & accept these policies to avail of IITD Internet & IT Facilities. You may visit to review and accept these policies. You will need to login with your kerberos ID.

Please note that you will need to visit the above site and agree to the policy by the 15th of Jan 2017, failing which your Internet privileges will be suspended.

The revised policies will come into effect from Jan 16th 2017.

For any queries you may call x-7126 or write to
Note regarding Security:Please be sure to check whether a email is genuinely from the IIT Admins -- look at the original source (all email clients can show this) and check the authenticated sender & DKIM signature for IIT Delhi. Also before entering your user ID/Password at a site you should make sure the sites security certificate is valid and authenticated with the IITD Certificate(s). See CSC website for further details on Digital Singing of emails and IITD CA Certificates.
Last Updated on Thursday, 05 January 2017 21:05


E-mail Print PDF

Request Access

More details at

How to Use

You will need an ssh client to connect to the Padum cluster. CPU login is available through ssh (Use IITD credentials). To copy data use scp to GPU or Mic (Xeon Phi) nodes can be directly accessed through and respectively. Please avoid using gpu and mic for large data transfer.

Last Updated on Tuesday, 14 November 2017 14:20

Track Wifi & Proxy Usage

E-mail Print PDF


CSC has introduced a site for user to view  proxy Usage and track Wifi & Proxy Session data usage. You may visit


Baadal: the IITD computing cloud

Print PDF

The CSC has commissioned a new cloud computing environment for high performance computing based on

  1. 64 blade servers each with 2x8 core Intel(R) Xeon(R) CPU X5670  @ 2.93GHz and 200 GB RAM
  2. A  2 x 10Gbps ethernet backbone
  3. 150 TB of virtualized storage based on a NetApp 8040V NAS and HP EVA6400 SAN with FC disks.
  4. Open source virtualization technology based on KVM.
  5. Baadal: an indigineously developed cloud orchestration and virtualization management software that can work with multiple virtualization technologies like KVM, Xen and VmWare

The cloud computing environment above has a raw processing capacity of around 30 TFlops. 

Last Updated on Friday, 13 January 2017 06:26
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  Next 
  •  End 
  • »

Page 1 of 5