Basic task each decker has to perform during almost all missions is bypassing of the Firewall ICE. This ICE controls connections to secure parts of system and should allow only authorized users. Decker has to deal with it to gain access inner parts of the system.
Decker has 3 options how to bypass this ICE.
1) Stealth software – trying to move through ICE will automatically try to use Stealth software and hide decker’s presence to ICE. Skill check using stealth skill, firmware and software against ICE and node rating will be made. If check is successful then decker will move to next node without alerting ICE. Otherwise move is blocked and on critical fail the ICE will be alerted. If ICE is already alerted, this method cannot succeed.
2) Deceive software – Select ICE and run Deceive software. Skill check using stealth skill, firmware and deceive software against ICE and node rating will be made. If successful then ICE will be deceived for a number of turns, depending on level of success, and will allow decker to pass through. ICE will be alerted on critical fail. Again if ICE is already alerted, this method cannot succeed.
3) Attack/Virus software – Decker may simply destroy the ICE using attack or virus software. This skill check uses attack skill, firmware and software against ICE and node rating. Level of success determines the amount of damage to the ICE integrity. ICE will become alerted when Attack software is used and will try to raise system alarm.
Clearly stealthy approach is preferable but may not be possible if the ICE is already alerted. Special types of the Firewall ICE can also be more resistant to Stealth and Deceive programs making it harder to succeed with them.