QUOTE (KCKitsune @ Sep 26 2009, 08:40 AM)

Just slave the other commlinks to your master commlink and have them run all the IC for you. Also, if you have any cyberware, cluster them together, slave them to your master commlink, and run even more IC on that.
The advantage of this is that while slaved to your master commlink (which should have firewall, Stealth & Encrypt at 6 each) it can NOT be hacked from the outside. It will only accept commands from the master commlink.
If you want to see the rules for clusters, check out Unwired on page 59.
I don't understand the advantage to clustering all of your cyberware. I agree that they should be slaved to the master, just like the comm #2. I guess you could run IC on the clustered node and that would save you from having an agent(IC) in each of the other peripheral nodes, but you won't need IC in those nodes anyhow in most cases.
Of course, commlink 2 or the peripherals could be spoofed if you had the access ID of the master node.
edit:
looking at the other players question, could he have 2 commlinks and have them both run IC, sure. That would of course be 2 different nodes though, if he wants that.
We could cluster both commlinks, but since clustering uses the lowest system and averaged response, there isn't much advantage to this. He could just run 2 pieces IC on the first commlink.