As part of an automated deployment of a server hosting SQL Server Analysis Services, the inbound firewall rule was required to be created. This process was achieved by modifying the network configuration from a command line using the netsh.exe utility as a deployment step.
The TCP service port required to allow inbound connections on a default named instance is 2383 and can be enabled as below:
netsh advfirewall firewall add rule name=”SQL Server Analysis Services inbound on TCP 2383″ dir=in action=allow protocol=TCP localport=2383 profile=domain
For a named instance of Analysis Services you would need to change the port used to be static (for information, see previous post https://deangrant.wordpress.com/2011/11/30/change-the-port-number-of-ssas-instance/) and run the below, where the example used 5345 as the TCP service port:
netsh advfirewall firewall add rule name=”SQL Server Analysis Services inbound on TCP 5345″ dir=in action=allow protocol=TCP localport=5345 profile=domain