In tip 7907, I used the netsh firewall set portopening TCP 445 ENABLE to open TCP port 445.

In Appendix B of Deploying Windows Firewall Settings for Microsoft® Windows® XP with Service Pack 2, Microsoft describes the Netsh Command Syntax for the Netsh Firewall Context which begins with:

The following Netsh commands can be used in scripts or at the command line to configure Windows Firewall for IPv4 and IPv6 traffic when executed from the netsh firewall context:

• add allowedprogram
• set allowedprogram
• delete allowedprogram
• set icmpsetting
• set multicastbroadcastresponse
• set notifications
• set logging
• set opmode
• add portopening
• set portopening
• delete portopening
• set service
• show
Microsoft describes the set portopening context as follows:
Used to modify the settings of an existing open TCP or UDP port.
Syntax:
set portopening

\[ protocol = \] TCP|UDP|ALL
\[ port = \] 1-65535
\[ \[ name = \] name
\[ mode = \] ENABLE|DISABLE
\[ scope = \] ALL|SUBNET
\[ profile = \] CURRENT|DOMAIN|STANDARD|ALL
\[ interface = \] name \]

protocol - The protocol.
TCP
UDP
ALL - All protocols.

port - The port.

name - The friendly name.

mode - The mode. If no mode is specified, ENABLE is assumed.
ENABLE - Enforced by the firewall.
DISABLE - Not enforced by the firewall.

scope - The scope. If no scope is specified, SUBNET is assumed.
ALL - All traffic will be allowed.
SUBNET - Only local subnet traffic will be allowed.

profile - The profile. If no profile is specified, CURRENT is assumed.
CURRENT - The current profile.
DOMAIN - The domain profile.
STANDARD - The standard profile.
ALL - All profiles.

interface - The friendly name of the interface from Network Connections.

NOTE: The profile and scope parameters may not be used if specifying the interface
parameter.