FAQs

Things to do before reporting a problem

IIT Indore WiFi Connection process

How to connect to IITI_Secure or IITI_Secure_5G ? 
Please perform the following steps (For Android based devices) 

  1. Download the certificate attached to this mail to the Android device.
  2. Install the certificate (Settings may vary from phone to phone, you can search for the “wifi certificate” or “certificate” settings from the search bar)  e.g.
    • Open your phone’s Settings (menu items/names may differ)
    • Select Security -> Advanced -> Encryption & credentials.
    • Under “Credential storage,” select Install a certificate -> Wi-Fi Certificate.
    • In the top left, select Menu. 
    • Under “Open from,” select the location where you saved the certificate.
    • Select the certificate file GW_CA_IITI.crt 
    • Enter a name for the certificate e.g. IITI-WIFI
    • Select OK.

          3. Steps to connect to IITI_Secure or IITI_Secure_5G

  • EAP Method: PEAP
  • Phase 2 Authentication: MSCHAPV2
  • CA Certificate: Newly Added Certificate ( e.g. IITI-WIFI ) 
  • Online Certificate Status: Do Not Verify
  • Domain: rad.iiti.ac.in
  • Identity: Your Username 
  • Anonymous Identity: Leave Blank
  • Password: Your internet access password
  • Select Save and connect

IIT Indore Wifi Certificate

Basic Network Problems

  • Cable Problem: The cable which is used to connect two devices can get faulty, shortened or can be physically damaged.
  • Connectivity Problem: The port or interface on which the device is connected or configured can be physically down or faulty due to which the source host will not be able to communicate with the destination host.
  • Configuration Issue: Due to a wrong configuration, looping the IP, routing problem and other configuration issues, network fault may arise and the services will get affected.
  • Software Issue: Owing to software compatibility issues and version mismatch, the transmission of IP data packets between the source and destination is interrupted.
  • Traffic overload: If the link is over utilized then the capacity or traffic on a device is more than the carrying capacity of it and due to overload condition the device will start behaving abnormally.
  • Network IP issue: Due to improper configuration of IP addresses and subnet mask and routing IP to the next hop, the source will not be able to reach the destination IP through the network.
Before creating a Ticket on IT Help Desk, you are requested to perform the below troubleshooting steps:
  1. Have you checked the physical connectivity?
  2. Have you entered correct IP address, subnet mask, gateway and DNS server?
  3. Can you ping your neighbors IP address?
  4. Can you telnet to the gateway?
Steps for checking physical connectivity
  1. Check if LEDs are glowing in the place where network cable is plugged into your PC.
  2. If they are not, check if the cable is plugged properly. Remove and replug it at both ends. One end is in your computer and other is in the wall jack.
  3. If LED’s are glowing, go to next step. If they are still not glowing, please call a vendor to rectify the situation.
If physical connectivity seems fine then go to the next section:
1. Check if your IP address, subnet mask, gateway and DNS entries are correct.
2.Type the following command in command prompt/ terminal for finding your IP on the machine:
On windows system: “ipconfig /all”. This command shows the machines IP address, subnet mask default gateway and DNS.
On Linux: Login as root. And type “/sbin/ifconfig”
3. Try to ping other systems in your building using the command prompt/ terminal. The command is: “ping x.x.x.x”
where x.x.x.x is the IP address.
4. If that succeeds, try to ping the switch of your building.
5. If that succeeds, try to telnet the gateway.
6. If all is done but still you are unable to connect to the network, please register your complaint online at IT HelpDesk
Please specify the outcome of the test your performed as mentioned above in your complaint. This will help to solve your problem faster.
IMPORTANT INFORMATION:
Please update your system regularly and scan your devices for viruses and trojans for infection or vulnerability. Avoid using infected flash drive from known or unknown sources.

How to report an issue related to IT Services?

System and Network related issues can be reported to the IT team through the medium of Ticket which can be created on IT Helpdesk. After receiving the ticket  the IT team will contact you further to resolve the issues based on availability and assignment.

http://ithelpdesk.iiti.ac.in/

How to Change Internet Login Password

The default Internet Login password can be changed by clicking on the URL https://idpass1.iiti.ac.in/

How to get Institute Internet and Email Account

Please fill up the form A6 for getting an official email ID and internet account. Click on the link to download Internet/Email Account Opening Form. After filling up the form please visit HUB building First Floor room 109.

How do i connect to IITI network

You will need a Username and Password to connect to the Institute Network. Using the Login credentials you can browse internet either through wired or wireless connection. The Institute Wi-fi SSIDs are IITI_2.4G and IITI_5G. Please visit HUB building for availing the services.

How to install office 365

Manual for installing Office 365

How to install Matlab in Linux & Windows

Please login to institute url of MATLAB https://in.mathworks.com/academia/tah-portal/indian-institute-of-technology-indore-31439162.html with institute email id

For more information you may visit Matlab Official Website.

How to generate Secure Shell (SSH) key

PuTTYgen is used to generate public or private key pair for creating SSH keys. Below is the complete guidance about how to generate RSA key in the Windows operating system:

1. Once you install the PuTTY on your machine, you can easily run PuTTYgen. For the same, go to Windows -> Start Menu -> All Programs -> PuTTY -> PuTTYgen.
2. You will see the PuTTY key generator dialog box on your screen
3. You will find a “Generate” button in that dialog. Clicking on it will lead to generating the keys for you.
4. Now you will need to add a unique key passphrase in the Key passphrase and Confirm passphrase field.
5. Click on the “Save Public Key” and “Save Private Key” buttons to save your public and private keys.
6. You will see the text starting with ssh-RSA in the Public key for pasting into OpenSSH authorized_keys file field which is located at the top of the window. Right-click in the text field labeled Public key for pasting into OpenSSH authorized_keys file and choose Select All. Right-click again in the same text field and choose Copy. Paste this to a notepad and save this text file. Share this file with IT team for ssh access to your web directory.

VPN Configuration for Windows & Linux

Please contact CITC for details.

Important Quick Links

How to stay secure online  ( Do’s & Don’ts)
Do’s

  • Always use hard-to-guess passwords or passphrases. A password should have a minimum of 8 characters using uppercase letters, lowercase letters, numbers, and special characters. To make it easy for you to remember but hard for an attacker to guess
  • It is suggested to use different passwords for different accounts. If one password gets hacked, your other accounts are not compromised.
  • Keep your passwords or passphrases confidential. DON’T share them with others or write them down. You are responsible for all activities associated with your credentials.
  • Pay attention to phishing traps in email and watch for telltale signs of a scam. DON’T open mail or attachments from an untrusted source. If you receive a suspicious email, the best thing to do is to delete the message and report it to your manager and to your IT Support vendor.
  • Destroy information properly when it is no longer needed. Place paper in designated confidential destruction bins throughout the office or use a crosscut shredder.
  • Be aware of your surroundings when printing, copying, faxing or discussing sensitive information. Pick up information from printers, copiers, or faxes in a timely manner.
  • Lock your computer and mobile phone when not in use. This protects data from unauthorized access and use.
  • Avoid using public Wi-Fi hotspots for confidential browsing. Always use virtual private network tunnels to protect the data and the device.
  • Report all suspicious activity and cyber incidents to the CITC team  Keep all areas containing sensitive information physically secured and allow access by authorized individuals only.

Don’ts

  • Never click on links from an unknown or untrusted source. Cyber attackers often use them to trick you into visiting malicious sites and downloading malware that can be used to steal data and damage networks.
  • Don’t be tricked into giving away confidential information. It’s easy for an unauthorized person to call and pretend to be an employee or business partner.
  • Don’t respond to phone calls or emails requesting confidential data.
  • Don’t leave sensitive information lying around the office.
  • Don’t leave printouts or portable media containing private information on your desk. Lock them in a drawer to reduce the risk of unauthorized disclosure.
  • Don’t post any private or sensitive information, such as credit card numbers, passwords or other private information, on public sites, including social media sites, and Don’t send it through email unless authorized to do so. (Use privacy settings on social media sites to restrict access to your personal information)
  • Don’t leave wireless or Bluetooth turned on when not in use. Only do so when planning to use and only in a safe environment.
  • Don’t leave devices unattended. Keep all mobile devices, such as laptops and cell phones physically secured. If a device is lost or stolen, report it immediately to your manager and ISO/designated security representative.
  • Don’t plug in portable devices without permission from your management. These devices may be compromised with code just waiting to launch as soon as you plug them into a computer.
  • Don’t install unauthorized programs on your work computer. Malicious applications often pose as legitimate software.