QUOTE (p50 Unwired)
In game terms, nexi work exactly like standard nodes with a few exceptions. They have a higher processor limit, allowing for more active programs (with the exception of agents, IC, AIs, sprites, and e-ghosts, which are limited by Response per standard rules
The errata says Sprites arent limited by response I thiiiiink but that aside even a Nexus cant be stocked with agents.
The way to have a bunch of defenders in a node is Clustering and then of course half of the programs whether aboard an agent or not can be ergonomic.
QUOTE (p55 Unwired)
Once clustered, the group of nodes is treated as a single node with effective Firewall and System ratings equal to the lowest respective ratings of the nodes. The cluster’s Response is equal to the average of the node’s Response ratings. The processor limit is determined by adding the respective limits of the nodes composing the cluster and halving them. Persona limit is determined by adding the respective limits of the devices together.
The key part is bolded. It means how many hackers can be present (persona limit) and how many programs/bonus subscriptions can be present (processor limit) and incidentally, half the commlinks can have Response 5 and the other half Response 6 so it'll round up to 6 but save some cash.
Have the cluster be in a armored case hidden in a building so they can mix physical intrusion with matrix intrusion. If the building denizens dont know the 'game' is being played even better.
Use combinations of Cryptesesia Modules on the clustered commlinks so if they dont have matching systems its not navigable unless they have the whole combination that matches.
Use IC tricked out with programs options like Home Ground (6) which gives 6 extra dice to detect an enemy.
Give the runners biomonitors so the agents inside with the Limitation (Wont attack unconcious people using a subscribed biomonitor) can get hit by blackout programs and still have a way for the punches to get pulled before their is a real issue with death. Blackic changes things. DONT USE TAR BABY DATA BOMBS. The errata has raised Data Bomb damage exponentially.
Use a series of nodes. Start with a honeypot with hidden nodes hardwired off that initial node and ic scanning using analyze to see them then have the ic allow only the first runner through to the second node to seperate the team. Have the ic in the second node use Crash Program to make the runner vulnerable while other ic is attacking.
Have the IC use one IC to gather matrix id's using track and another to just spoof commands to agents so they are mind controlled. Rawr. mind Control, every runners nightmare.
Lastly, three musketeers IC gives the most mileage because it counts as a single program for load but gets three actions for each of 3 passes per combat turn.
Hope that helps you make a nice deathtrap. The only way to really ramp that up is to invite other runner teams to compete at the same time...
;-)