...in the example it says he ignores the Firewall
If you slave a device to a master device (like a commlink) or a host then the device get to use the higher firewall rating while defending against hackers.
The drawback is that if a hacker manage to place a mark on the device then he also get to put a mark on the master device or the host that the device is slaved to (for free).
If a hacker establish a
direct connection to the device then the device no longer get to use the higher firewall rating while defending against the hacker.
...but if the hacker gain a mark on the device he will still get to put a mark on the master device or the host that the device is slaved to (for free).
This is a good method to gain that first mark on the host so you can enter it without actually fighting host ratings. Once you are inside the host you will be considered
directly connected to all other devices slaved to the host (while the hacker is inside the host, slaved devices don't get to use the host's higher firewall rating while defending against the hacker).
Since corporations are aware of this exploit they tend to not slave devices that are exposed to the public. Maglocks and cameras in public areas are probably not slaved to the host, while maglocks, elevators and cameras behind the "emplyees only" door are.
In many cases you can make getting physical access to that first slaved device into a mini run of its own. Maybe the team found out that the control hatch to the service entry tunnel at sub level 3 in the garage under the facility is slaved to the host but in order to reach it the magician might need to disguise the rigger van into a delivery van and the face might need to convince the security guard at the check point that you have a legit delivery.
If your hacker is dedicated and have huge dice pools he can probably just hack the host in hot-sim and get a direct connection to all devices slaved to the host without ever getting close to the actual facility.
A hacker have three different ways to be considered having a direct connection to a device:
- Wire between cyberdeck and the device, this require physical proximity
- Physically touching the device while using living persona with a skinlink echo, this require physical proximity
- Being inside the host that the device is slaved to, this require that you already have a mark on the host so may enter it - this is an exception to the rule where you are not allowed to interact with icons out on the grid while you are inside a host