Q.: What is Irbis Firewall?
A.: Irbis Firewall is a packet filter
application (firewall) and HTTP-proxy server application. We also
have plans on implementing the SOCKS-server support in future versions.
Q.: What is Irbis Firewall intended for?
A.: Irbis Firewall allows you to control
access to your computer from network. Irbis Firewall filters all
incoming and outgoing IP packets so only allowed kinds of packets will
be sent from your computer or received by your computer.
Q.: How does the trial version of Irbis Firewall
differ from the registered version?
A.: The trial version of Irbis Firewall is fully functional.
You can use it for evaluation purposes for a period of 30 runs following the initial installation.
Q.: What benefits shall I acquire if register Irbis Firewall?
A.: As a registered user you will have a right to obtain a technical support, to
receive information about all the product updates and to have free upgrades within 12 months after the purchase date. Also your
suggestions will be taken into consideration in developing the new versions of Irbis Firewall.
Q.: What operating does systems Irbis Firewall support?
A.: Irbis Firewall can be used on most of
modern Microsoft Windows operating systems: Microsoft Windows XP, Microsoft Windows 2000
and Microsoft Windows 2003 on x86 platform (Intel/AMD/Transmeta).
Microsoft Windows 95/98/NT are not supported.
Q.: What hardware does Irbis Firewall require?
A.: Irbis Firewall can be run on any
hardware allowing you to run one of the required operating system.
Q.: Has Irbis Firewall support for IP aliases?
A.: Yes, Irbis Firewall supports
IP aliases. For a not-a-router computer (server or workstation) IP aliases
acts as separate IP interfaces. If you use computer as router, you also can
attach rulesets to all aliased interfaces, you need follow common firewalled
routers configuration strategy.
Q.: Has Irbis Firewall support for Internet Connection Sharing?
A.: Yes, Irbis Firewall
can work together with Internet Connection sharing if some your applications
requires it. Like IP aliases case, ICS requires knowledge of a router
configuration and protection strategy. Support service also has advanced
recommendations that is available for our customers.
Q: What is the difference between Irbis Firewall Standard and Irbis Firewall Professional?
A: Irbis Firewall Standard protects a single PC or a server. Use it when you don't need to manage multiple Irbis Firewall installations. Irbis Firewall Professional can be used to manage multiple Irbis Firewall installations and to collect firewall logs from all protected computers on one server
Q.: What is the difference between single and site licenses of Irbis Firewall?
A.: If you buy a single license of Irbis Firewall you will get only one registered
copy of the product without a right of giving it to anyone else. If you buy a site license then you will be able to make copies and give
them to as many people as you want, but within the only one organization. Buying a site license is reasonable if you need to supply with our
software all your company stuff or some company department stuff. In such case you can buy a site license instead of buying single licenses
for each person and save a bunch of money.
Q.: What criteria does Irbis Firewall use while filtering packets?
A.: Irbis Firewall can filter traffic depending
on the following conditions: packet source IP, packet destination IP, protocol,
source and destination ports numbers, TCP packet flags.
Q.: Does Irbis Firewall filter packets depending on applications?
A.: No. Application-based access control is not
implemented, because it is required only if your system may have a "Trojan horse"
software installed, whereas "Trojan horse" programs should be removed by the
antivirus software. Such policy also allows improving the system performance and
implement "userless" Irbis Firewall working mode.
Q.: What kinds of "Trojan Horse" programs does Irbis Firewall lock?
A.: Unless Irbis Firewall does not
implement application-based filtering, it successfully locks NetBus,
BackOriffice and many other Trojan programs. With some restrictions,
Irbis Firewall can lock CodeRed-style worms (CodeRed, Slammer & etc).
Q.: What criteria does HTTP-proxy server use for the access control?
A.: HTTP-proxy server can control access
depending on any combinations of client computer IP address, requested
server name, requested document name, request method, etc.
Q.: How can I install a blacklist?
A.: To install a blacklist follow the instructions on
Q.: Can I modify a blacklist?
A.: Yes, of course you can.
Open our blacklist file in a text editor and see what it contains.
Modify the file, save it with another name, and use as a usual blacklist file.
Any more questions? Don't hesitate to write to our support service: [email protected]