RADIUS (Remote Authentication in Dial-Up User Service) is a network protocol for implementing authentication, authorization, and information collection about resources in use. It is designed to transfer information between the central platform and the clients/devices on the network. Your RADIUS (Remote Access) server can communicate with a central server/service (for example, an Active Directory domain controller) to authenticate remote clients over the phone and authorize them to access certain services or network resources. This allows you to use a centralized authentication system on your domain.
In this article, we show how to configure RADIUS host server based on Windows Server 2022, 2019 or 2016 operating systems and how to configure RADIUS authentication on Cisco devices using the Network Policy Server (NPS) service. In this example, RADIUS uses AD to authenticate remote users and authorize them to access Cisco and Mikrotik switches/routers (acting as RADIUS clients) from the command line.
Installing the Radius Server (NPS) role on Windows Server 2022/2019/2016
First create a new onesafety equipmentin the Active Directory domain (for example, RemoteCiscoUsers) where you need to add all users who can authenticate to Cisco routers and switches (How toAdd AD user to group with PowerShell?).
Starting with Windows Server 2008 R2, RADIUS server functionality has been implemented with the Network Policy Services (NPS) role. The NPS feature allows you to authenticate external clients to Active Directory using the Radius protocol.
Therefore, you need to install the RADIUS server role on Windows Server 2022/2019/2016. open itserver administratorconsole and run itAdd roles and featuresmagician. The RADIUS (Remote Authentication Dial-In User Service) protocol in Windows Server is part of the Network Policy Server role. In the wizard that appears, select it.Network policies and access servicesrole in the role selection step.
Observation. You can also install NPS features and management tools from an elevated PowerShell console:
Instalar-WindowsFeature NPAS –IncludeManagementTools
Make sure the NPAS role is installed on the Windows Server host:
Get-WindowsFeature -Nombre NPAS
After the role is installed, open Network Policy Server (nps.msc) from the Tools menu.
To use the NPS server in the domain, you must register it in Active Directory. In the NPS module, right-click a root folder and selectRegister server in Active Directory.
Confirm the server's registration in Active Directory.
You can also register your NPS server in Active Directory with a command:
netsh ras add registered server
In this case, the server has permission to read the Active Directory user account properties to authenticate users. The server is added to the built-in domain groupRAS- on IAS servers.
You can now add the Radius client. The Radius client is the device from which your server receives authentication requests. In this example, it could be a Cisco router, switch, Wi-Fi access point, etc.
To add the new Radius client, expand itRADIUS-clients en-serversin the NPS console tree and selectYoungin itRADIUS clientsgentle.
Fill in the fields on the Settings tabfriendly name, clientADDRESS(you can specify IP address or DNS name) andsecret to you+Sharing Confirmationpassword (you will use this password in your Cisco switch/router configuration).
Observation. The shared secret password is rarely used in large enterprise networks due to shared key distribution issues. Instead of shared passwords, it is recommended to use certificates. If you have implemented an enterprise CA to implement your PKI infrastructure, you can request and import a *.p12 certificate for your Radius/NPS server. Simply add the certificate to the local computer's personal certificate store.
On the Advanced tab, select Vendor Name - Cisco.
You can use the PowerShell command instead of the NPS GUI to add a new RADIUS client. In this case, you can use the New-NpsRadiusClient PowerShell cmdlet:
New-NpsRadiusClient – Call "192.168.31.1" - Call "cisco2960" -SharedSecret
Configure NPS policies on the RADIUS server
NPS policies allow you to authenticate external users and grant them access rights configured in the NPS role. NPS access policies allow you to associate RADIUS client records and the domain security group that determines the level of access to CISCO devices.
There are two types of policies on a RADIUS server:
- Login Request Policy— This policy defines a set of conditions that determine which RADIUS servers must authenticate and authorize connection requests from RADIUS clients.
- Network Policy— a set of conditions and settings that allow you to determine who is authorized to connect to your network and a list of assigned access rights. These policies are processed sequentially from top to bottom.
In our case, we only use the NPS network policy. fold itPolicy>Network Policybranch and chooseYoung:
Specify the policy name, the network access server type should remain unchanged (unspecified).
in the next stepIdentify the conditions, you must add the conditions under which this RADIUS policy applies. Let's add two conditions: the authorized user must be a member of a specific domain security group, and the device they want to access has a specific name. use itAdditionoption to create a new condition by clicking onWindows teamwrite (add group RemoteCiscoUsers) and specify itFriendly name for the client(Cisco_*).
Observation. The Client Friendly Name field may differ from the DNS name of your device. We need it in later steps to identify a specific network device when creating a remote access policy. For example, you can use this name to specify a mask that allows a single access policy to handle multiple RADIUS clients.
On the next screen, select Access Granted.
The Cisco switch only supports the unencrypted authentication method (PAP, SPAP), so we disabled all other options.
Skip the next step for configuration restrictions.
In Configure Settings, go to RADIUS Attributes > Default. Delete the existing features there and click the Add button.
Select Access Type > All, then Service Type > Add. Specify other = Login.
Now add a new attribute under RADIUS Attributes > Vendor Specific. Select Cisco under Provider and click Add. Here you need to add information about the feature. Click Add and enter the following value:
shell: priv-lvl=15;
This value means that the user authorized by this policy has a maximum of (15) administrative access rights to the Cisco device.
The last screen shows all the selected NPS policy settings. Click Finish.
Suggestion. You can backup the current NPS server configuration to the XML file with the command:
Export-NpsConfiguration - Pad c:\ps\backup_nps.xml
If you need to restore the NPS configuration from a previously created backup file, do the following:
Import-NpsConfiguration - Pad c:\ps\backup_nps.xml
When creating and planning RADIUS policies, keep in mind what is important in their order. Policies are processed from top to bottom and when it is determined that all conditions of the next policy are met, further processing is stopped. You can change the policy priorities in the NPS console by using the process order value.
To ensure that the user account can be used for Radius authentication, open itActive Directory Users and Computers Snap-in(dsa.msc),find the user, open its properties, go to itCall totab and select itControl access through NPS network policieschoice inNetwork access permissionUnit.
You can also check the value of the current option using PowerShell:
Get-ADUser richard.doe -Propiedades msNPAllowDialin -Servidor dc1.theitbros.com
If the above command did not return any output (empty), it means that the default "Access control via NPS Network Policy" is used.
To reset this user-defined attribute to its default state, use the command:
Set-ADUser richard.doe -Remove msNPAllowDialin -Server dc1.theitbros.com
Or you can reset this attribute for all users in the specificActive Directory-OUthe habitsLDAPfilter:
Get-ADUser -SearchBase "ou=Users,ou=Paris,dc=theitbros,dc=com" -LDAPFilter "(msNPAllowDialin=*)" | % {Set-ADUser $_ -Clear msNPAllowDialin}
Configure RADIUS Settings on Cisco Devices
After creating the policy, you can proceed to configure your Cisco routers or switches to authenticate to the newly installed Radius NPS server.
Because we use domain accounts for authorization, user credentials must be sent over the network in encrypted form. To do this, disable telnet on the switch and enable SSHv2 on Cisco using the following commands in configuration mode:
set terminal encryption key to generate rsa 1024ip ssh version 2 module
AAA works as follows: if the response from the server is not received, the client assumes the authentication failure. Be sure to create a local user in case the RADIUS server is unavailable for some reason.
You can create a local user with the following command:
username cisco_local password $UPerrP@ssw0rd
Run the following commands to require the use of SSH and disable remote access via Telnet:
line vty 5 15transport ssh input
The following is an example of the configuration to authorize a Radius server for the Cisco Catalyst Switch:
aaa new model aaa authentication login default group radio local aaa authorization exec default group radio ) password encryption# enable password encryption
If you have multiple Radius servers, add them to the group:
aaa group server radio radius_srv_groupserver 192.168.1.16servidor 192.168.101.16
This completes the minimal configuration of the switch and you can attempt to verify Radius authentication on your Cisco device.
How to configure RADIUS authentication on Microtik devices (RouterOS)?
In this part, we will show you how to configure RADIUS authentication for VPN user connections through a Mikrotik router (based on RouterOS).
Open the Network Policy Server console (nps.msc) and create a new Radius client.
ChooseNew RADIUS clientand configure the following settings:
- Enable this RADIUS client.
- Friendly Name – Enter the name of your Mikrotik router here.
- Address: specifically the IP address of the Mikrotik router.
- Enter your pre-shared secret key.
Create a new network policy with the following settings:
- User Groups— specify the name of the domain user group that can authenticate to the Mikrotik router.
- Authentication type— MS‑CHAPv2;
- tunnel type— Point-to-Point Tunneling Protocol (PPTP).
- Rights of access- Access granted?
- In itConfigure authentication methodswindow, she was left aloneMS-CHAPv2and allow users to change expired passwords (User can change password after it expiresselection);
- Bandwidth and Multilink Allocation Protocol (BAP)– Do not allow multilink connections.
- In itmodel to followsection, remove Service-Type – Framed and leave only Framed-ProtocolPPS;
- encryptions— Leave only the most secure encryption method (128-bit MPP).
After creating a new policy, open Network Policy Server Configuration.
Allow only the following UDP ports for RADIUS server communication:
- Authentication — 1812;
- Accounting - 1813.
Make sure these UDP ports are open in the Microsoft Defender Firewall rules. If not, open them manually.
Now you need to configure the connection settings for Windows Server RADIUS in the Mikrotik settings (we assume that the PPP VPN server is already configured in RouterOS for the user connection).
In the PPTP server settings, just check itmschap2can be used for authentication.
Now we need to configure the connection to the Radius NPS server. Select New Radius Server and specify the following options:
- Service: ppn;
- Address: IP address of the RADIUS server.
- Secret: Pre-shared key that you specified in the network policy settings.
- Src/Address: Mikrotik IP address from which traffic is sent to NPS.
- Authentication Port: 1812;
- Accounting portal: 1813.
Add appropriate access rules to Mikrotik Firewall.
then go tosecret>Authentication and accounting PPPand change ituse the lightningselection.
It remains to configure a PPTP VPN connection to your Mikrotik VPN on the users' computers. To authenticate to Mikrotik, users can use their Active Directory accounts (the accounts must be added to the AD group you specified when creating the Miktotik network policy in NPS).
How do I check NPS/RADIUS logs in Windows?
To enable NPS RADIUS server authentication logging, you must enable the network policy server audit policy. You can enable this policy through the Local Group Policy Editor or with the following commands:
auditpol /get /subcategory:"Network Policy Server" auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable
You can now open the Event Viewer console (eventvwr.msc), go to Windows Logs > Security, and filter the event by Event ID 6272.
The network policy server has granted access to a user.
To find all NPS authorization events for the specific user (Richard.Doe in this example), use the following PowerShell script:
$Query = @""@$events = Get-WinEvent -FilterXML $Query$ipaddr = @{ label=" IP"; Expression={$_.properties[9].value} }$events | select $ipaddr | group "IP" | format Table count, name - autosize
condwindows server
FAQs
How to configure Radius Server on Windows Server 2016? – TheITBros? ›
Open Microsoft Management Console (MMC) on the server that will be hosting the RADIUS server. Select File > Add/Remove Snap-in. In the Available snap-ins list, click Certificates, and the click Add. In the Certificates snap-in window, select Computer Account, select Local Computer, and then click Finish.
How to configure RADIUS server in Windows? ›- Set up a Security Group. In the Active Directory domain, create a security group. ...
- Add Network Policy and Access Services Role. The Server Manager console contains the Add Roles and Features wizard. ...
- Snap-In NPS to AD. ...
- Add RADIUS Client to NPS.
- Go to Configuration → Self-Service → Multi-factor Authentication → MFA/TFA Settings. In the Endpoint MFA section, select the RADIUS Authentication from the drop-down.
- Enable the Bypass TFA if ADSelfService Plus is down option.
- Click Save Settings.
- Navigate to Wireless > Configure > Access control and select the desired SSID from the dropdown menu.
- Under RADIUS accounting, select RADIUS accounting is enabled.
- Under RADIUS accounting servers, click Add a server. ...
- Enter the details for: ...
- Click Save changes.
Open Microsoft Management Console (MMC) on the server that will be hosting the RADIUS server. Select File > Add/Remove Snap-in. In the Available snap-ins list, click Certificates, and the click Add. In the Certificates snap-in window, select Computer Account, select Local Computer, and then click Finish.
Can Windows server be RADIUS server? ›Windows Server 2016 or Windows Server 2019 Standard/Datacenter Edition. With NPS in Windows Server 2016 Standard or Datacenter, you can configure an unlimited number of RADIUS clients and remote RADIUS server groups. In addition, you can configure RADIUS clients by specifying an IP address range.
What port does RADIUS server use Windows? ›The default ports are UDP ports 1812 and 1645 for RADIUS authentication messages and ports 1813 and 1646 for RADIUS accounting messages. If the NPS is configured with multiple network adapters, determine the adapters over which you want RADIUS traffic to be allowed.
Does RADIUS server need Active Directory? ›The RADIUS server must have user accounts that correspond to the users in Active Directory that will be using DirectAccess with OTP.
How does a RADIUS server work with Active Directory? ›The RADIUS server authenticates the user credentials and checks the user's access privileges against its central database, which can be in a flat-file format or stored on an external storage source such as SQL Server or Active Directory Server.
How do I add an IP address to my RADIUS server? ›Right-click RADIUS Clients, and then click New RADIUS Client. In New RADIUS Client, verify that the Enable this RADIUS client check box is selected. In New RADIUS Client, in Friendly name, type a display name for the NAS. In Address (IP or DNS), type the NAS IP address or fully qualified domain name (FQDN).
What ports are required for RADIUS Server? ›
By default, NPS sends and receives RADIUS traffic by using User Datagram Protocol (UDP) ports 1812, 1813, 1645, and 1646.
How to test Windows RADIUS Server? ›- Navigate to Diagnostics > Authentication.
- Set Authentication Server to the entry for NPS.
- Enter a username and password for a user which should have access.
- Click Test.
- Windows® Vista or Windows® 7 or Windows® 2008/R2 or Windows® 8 or Windows® Server 2012/R2 or Windows® 10 or Windows® Server 2016 or Windows® Server 2019 (Desktop Experience required) or Windows® 11 or Windows® Server 2022.
- Both 32 and 64-bit operating systems are supported.
- Select Server Manager and click Add Role.
- Select Certification Authority under Role Services and click Next.
- Select Enterprise under Setup Type and click Next.
- Select Root CA under CA Type and click Next.
- Select SHA256 and click Next.
RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
How to install server certificate in Windows 2016? ›In the left pane of the console, double-click Certificates (Local Computer). Right-click Personal, point to All Tasks, and then select Import. On the Welcome to the Certificate Import Wizard page, select Next. On the File to Import page, select Browse, locate your certificate file, and then select Next.
What is the difference between RADIUS client and RADIUS server? ›A RADIUS Client (or Network Access Server) is a networking device (like a VPN concentrator, router, switch) that is used to authenticate users. A RADIUS Server is a background process that runs on a UNIX or Windows server. It lets you maintain user profiles in a central database.
What is the Microsoft implementation of a RADIUS server? ›Network Policy Server (NPS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy. It is the successor of Internet Authentication Service (IAS).
What is the difference between Active Directory and RADIUS? ›You need the Active Directory when you require the security certificates such as LDAP, single sign on, and management. You need RADIUS when you want a remote access server to communicate with the central server. For providing the authentication, dial in users, and finally authorize their access to the service.
Is A RADIUS server UDP or TCP? ›The RADIUS protocol uses UDP packets. There are two UDP ports used as the destination port for RADIUS authentication packets (ports 1645 and 1812).
Does RADIUS talk to Active Directory? ›
Client application (VPN client): Sends authentication request to the RADIUS client. RADIUS client: Converts requests from client application and sends them to RADIUS server that has the NPS extension installed. RADIUS server: Connects with Active Directory to perform the primary authentication for the RADIUS request.
What is the difference between RADIUS and LDAP? ›RADIUS is a request-response protocol that sends Access-Request packets for authentication and Accounting-Request packets for accounting. In contrast, LDAP is a binary protocol that uses entries and attributes. Sometimes LDAP requires more than one transaction between the client and the server.
What are the cons of RADIUS server? ›The Cons of RADIUS
Regular upkeep and monitoring mean that, over time, the management of on-prem servers can be more intensive and frustrating.
- Setup.
- Freeradius Setup for Captive Portal authentication. Enable the configured modules. Configure the REST module. Configure the SQL module. Configure the site. ...
- Freeradius Setup for WPA Enterprise (EAP-TTLS-PAP) authentication.
- Single Sign-On (SAML)
- Signals.
- Captive portal mock views.
- Change log.
RADIUS was launched in the 1990s for authentication and connection of user directories and is now considered technically obsolete.
How to secure a RADIUS server? ›- Use Authorization Policies to restrict user access. ...
- Choose a Cloud RADIUS solution over on-premise servers. ...
- Use the EAP-TLS authentication protocol and digital certificates. ...
- Use a private certificate authority for certificate-based authentication. ...
- Use Server Certificate Validation.
RADIUS is a client/server protocol that runs in the application layer, and can use either TCP or UDP.
Can RADIUS server be installed on domain controller? ›you can install RADIUS on domain controller without any problems. In any way any authentication request from RADIUS will be sent to domain controller.
How do I list all IP addresses connected to my server? ›On Windows, type the command “ipconfig” and press Return. Get more information by typing the command “arp -a.” You should now see a basic list of the IP addresses for devices connected to your network.
What is RADIUS server IP address? ›The RADIUS server can be configured to generate an IP address from a pool of IP addresses. The IP address is returned in the Framed-IP-Address attribute of the Access-Accept packet. The system administrator can define a pool of IP addresses using the SMIT interface.
What is the difference between Tacacs and RADIUS? ›
The main difference between RADIUS and TACACS+ is that RADIUS is mainly a network access protocol for user authentication, whereas TACACS+ is predominantly used for administrating network devices like routers and switches.
Where are RADIUS logs located Windows? ›RADIUS logs are helpful when troubleshooting. The location of these logs varies by platform: Windows: C:\Program Files (x86)\Okta\Okta RADIUS Agent\current\logs.
What is port 3799 used for? ›The RADIUS CoA packet is sent on port UDP 3799 or UDP 1700 – as used by some network vendors. Disconnect-Request (PoD – Packet of Disconnect) is a request being sent to the NAS – Network Access Server (i.e. switch/access point), in order to terminate the user session/s.
How do I restart RADIUS service in Windows? ›In the start menu or the "Run" dialog box, type "services. msc" and hit enter to load the Services window. Right-click on AuthAnvil RADIUS Server and select "Properties". Under the Recovery tab, set the first and second failures to "Restart the Service".
How do I check my Windows server hardware configuration? ›To check your PC hardware specs, click on the Windows Start button, then click on Settings (the gear icon). In the Settings menu, click on System. Scroll down and click on About. On this screen, you should see specs for your processor, Memory (RAM), and other system info, including Windows version.
How do I check server connectivity in Windows? ›Select the Start button, then type settings. Select Settings > Network & internet. The status of your network connection will appear at the top. Windows 10 lets you quickly check your network connection status.
What are the different types of RADIUS servers? ›There are two that come with the RADIUS server: EAP-MSCHAPv2 and EAP-TLS. Protected EAP means that the EAP traffic between the supplicant (client) and the authentication server is encapsulated in a TLS encrypted tunnel.
What are the authentication methods of RADIUS server? ›Credential Authentication
The RADIUS server verifies the RADIUS client with the shared secret. Then, the RADIUS server verifies the authentication method. The RADIUS server runs on TLS and can be configured to authenticate users with EAP-TLS, EAP-TTLS-PAP, or PEAP-MSCHAPv2.
You can split the authentication and authorization on the controller between multiple RADIUS servers. A RADIUS sever can assume the role of either an authentication server, authorization server, or both.
Where is certificate in Windows 2016? ›This certificate store is located in the registry under the HKEY_LOCAL_MACHINE root. This type of certificate store is local to a user account on the computer. This certificate store is located in the registry under the HKEY_CURRENT_USER root.
How to install self signed certificate in Windows Server 2016? ›
- Install IIS service.
- Select Server certificates in IIS manager:
- Create Self signed certificate:
Expand the Computer Configuration section and open Windows Settings\Security Settings\Public Key. Right-click Trusted Root Certification Authorities and select Import. Follow the prompts in the wizard to import the root certificate (for example, rootCA. cer) and click OK.
Where is RADIUS configuration file? ›The RADIUS server daemon uses several configuration files. Server configuration information is saved in the /etc/radius/radiusd. conf file.
Which file you will modify to configure RADIUS authentication? ›To configure the listener to support RADIUS authentication, you will need to add the RADIUS authentication adapter to the listener configuration file.
What is RADIUS server for DHCP? ›The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies from a RADIUS server.
How do I update SSL certificate in Windows Server 2016? ›- Open the Internet Information Services (IIS) Manager. ...
- In the IIS Manager, select the main server node on the top left under Connections and double-click the Server Certificates.
- From the Actions pane on the top right, select Create Certificate Request.
- Open the simplified Windows Firewall settings, and click on Allow an app or feature through Windows Firewall. ...
- Enable COM+ Network Access:
- Open Regedit.
- Go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\COM3.
- Change the value of RemoteAccessEnabled to 1.
- In Server Manager, select Features, and select Add Features.
- In Add Features, select SMTP Server. If prompted, select Add Required Role Services, and select Next.
- Continue with the installation by selecting Next.
- In the Confirm Installation Selections window, select Install.
- Download the Windows Server 2022 ISO. The first and most crucial step in installing the new Windows Server 2022 is acquiring the installer file. ...
- Make the bootable ISO image for Windows Server 2022. ...
- Install Windows Server 2022. ...
- Configure your network on Windows Server 2022.
- Step 1: Add Roles and Features in Server Manager Dashboard.
- Step 2: Select Installation Type.
- Step 3: Select Destination Server.
- Step 4: Select Server Role.
- Step 5: Select Features.
- Step 6: Install Missing Features.
- Step 7: Confirm Installation.
How to setup RADIUS server for wifi authentication? ›
- Navigate to "Wireless"
- Choose "Radio#0: 5 GHz"
- In your SSID settings, select one of the EAP encryption methods for "Method" in "Security Settings"
- Enter the IP address of your RADIUS authentication server.
- Enter the secret for your RADIUS authentication.
- Go to the Server Manager application, select Dashboard, and select the Add roles and features link.
- This brings up the Add Roles and Features Wizard which opens on the Before You begin window. ...
- Select Next to continue.
- Prepare. Before you begin, document your network. ...
- Install your server. If your server came with an operating system preinstalled, you can connect it to the network and begin configuration. ...
- Configure your server. ...
- Complete the setup.
Enter cmd and press Enter to open the Command Prompt window. Type the command line systeminfo and press Enter. Your computer will show you all the specs for your system — just scroll through the results to find what you need.
Does RADIUS Server need Active Directory? ›The RADIUS server must have user accounts that correspond to the users in Active Directory that will be using DirectAccess with OTP.
What is the secret for RADIUS Server? ›The RADIUS Server reads the shared secret and ensures that the Access-Request message is from an authorized Client. If the Access-Request is not from an authorized Client, then the message is discarded. If the Client is authorized, the RADIUS Server reads the authentication method requested.
How to configure SMTP server in Windows 2016 to send mail? ›- In Server Manager, select Features, and select Add Features.
- In Add Features, select SMTP Server. If prompted, select Add Required Role Services, and select Next.
- Continue with the installation by selecting Next.
- In the Confirm Installation Selections window, select Install.
- From the Windows Start Menu select Start->Run and enter CMD as the application to open. Select OK.
- At the command prompt, enter the following: telnet mail.mailenable.com 25. ...
- Type the word QUIT and then press enter.
Most email servers use the Simple Mail Transfer Protocol, or SMTP. These servers allow you to send emails. You can find your SMTP server address by selecting Tools > Options > Outgoing Server on your email account's settings page.
What ports does RADIUS server use for authentication? ›The port values of 1812 for authentication and 1813 for accounting are RADIUS standard ports defined by the Internet Engineering Task Force (IETF) in RFCs 2865 and 2866. However, by default, many access servers use ports 1645 for authentication requests and 1646 for accounting requests.
What is the default port for RADIUS? ›
By default, NPS sends and receives RADIUS traffic by using User Datagram Protocol (UDP) ports 1812, 1813, 1645, and 1646.