Enabling Inbound Windows Firewall rule for Analysis Services

As part of an automated deployment of a server hosting SQL Server Analysis Services, the inbound firewall rule was required to be created. This process was achieved by modifying the network configuration from a command line using the netsh.exe utility as a deployment step.

The TCP service port required to allow inbound connections on  a default named instance is 2383 and can be enabled as below:

netsh advfirewall firewall add rule name=”SQL Server Analysis Services inbound on TCP 2383″ dir=in action=allow protocol=TCP localport=2383 profile=domain

For  a named instance of Analysis Services you would need to change the port used to be static (for information, see previous post https://deangrant.wordpress.com/2011/11/30/change-the-port-number-of-ssas-instance/) and run the below, where the example used 5345 as the TCP service port:

netsh advfirewall firewall add rule name=”SQL Server Analysis Services inbound on TCP 5345″ dir=in action=allow protocol=TCP localport=5345 profile=domain

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s