Aegis Defense

From Terminal Descent Wiki
Revision as of 01:39, 11 February 2026 by WikiBot (talk | contribs) (Auto-generated by Terminal Descent Wiki Bot)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Aegis Defense
NODE Nodes 11, 12
LAYER Deep Lattice
SECURITY style="padding: 4px 12px; color:
  1. ff6600;" | High
CONNECTS Panopticon Core (Node 10) → Aegis Perimeter (11) → Aegis Fortress (12)
NPCs Kessler (comm system), Rick (hidden)
ITEMS Fragment Gamma, Weapons Protocol
ENEMIES Sentry (Level 4-6), Barrier (Level 3), Hunter (Boss)
STATUS style="padding: 4px 12px; color:
  1. 00ff41;" | Active
The Consortium's military contractor. Two nodes: Aegis Perimeter (patrol timing puzzle) and Aegis Fortress (Fragment Gamma + Hunter boss).


Aegis Defense is the third Consortium corporate network infiltrated during Act II: The Deep Lattice. It consists of Aegis Perimeter (Node 11, Security 6) and Aegis Fortress (Node 12, Security 8) — the most heavily defended corporate installation.

Overview

Aegis handles weapons research, drone control, and military-grade IC deployment. Their security is the tightest of the three Consortium networks, featuring patrol timing puzzles and the Act II boss encounter.

Aegis Perimeter (Node 11)

Military-grade defense network. Security Level 6. Features IC patrol timing puzzles — players must study patrol patterns and exploit gaps. Rick operates a hidden safehouse here (discoverable through environmental clues).

Aegis Fortress (Node 12)

Defense contractor core. Security Level 8. Contains Fragment Gamma and the Weapons Protocol evidence item. Guarded by a Hunter IC boss — the most dangerous combat encounter in Act II.

Kessler's Office (H4) is accessible from here with forged biometric or Social skill 5, containing critical Consortium Evidence and the Master Key.

Boss: Hunter IC

The Hunter boss at Aegis Fortress is an adaptive combat AI that adjusts to the player's strategies. Repeated use of the same approach becomes less effective. Multiple approaches available:

  • Combat — Direct assault (requires high Combat skill and good programs)
  • Stealth — Exploit patrol gaps and use CLOAK
  • Analysis — ANALYZE to find weaknesses, then exploit

See Also