Nice overview! I think you got it right. At least, itīs pretty much the same as I cobbled it together

Apparently, Banshee kept a few thing a bit vague (or rather:
malleable) on purpose here. But since hosts are deep in GM territory anyways, I donīt mind that a bit. According to the CRB, there are probably a lot more little tweeks and quirks possible, like timed access opportunities and such. Stuff like that can be pretty usefull for storytelling purposes.
In this edition Host networks seem to have multiple 'access points' and 'distance' to a Host seem to be measured between the device you currently use to 'access the Matrix' (commlink, cyberdeck, RCC or living persona) and the closest 'matrix facing' 'access point' of the host network.
It is still a bit unclear what an 'access point' is, but for example a 'matrix facing' device slaved to the Host seem to count as an 'access point'. If a Host is designed to protect a facility then there will probably be several 'access points' scattered all over the facility. If you are inside the facility the distance will probably in effect be zero (or at least less than 100 meters) while if you are 3km from the facility then the distance to the closest 'access point' will probably be 3km. It also seem plasuible that a Global Host network can have 'access points' in several different countries.
Makes much more sense than the 5th Edition version, where hosts were almost magical universally accessable internet clouds 100% noise cancelation power!
It does not seem as if devices that are part of a Host network have to be 'matrix facing'. It seem as if they can also only exist on the 'inside' of a Host. This seem to make the specific device immune to Outsider actions (Data Spike, Tarpit and Spoof Command) unless you are already inside the Host (used the Enter Host action) or if you establish a 'direct connection' to the device.
It also seem as if a device is 'matrix facing' then you are allowed to take Outsider actions against it (Data Spike, Tarpit, Spoof Command) without having access on the Host network to take the 'Enter Host' action.
Unclear if security devices (drones, cameras, sensors, alarms etc) will ever be 'matrix facing' or if they by default will always be 'inside' the Host, but at lest there seem to be value in having other devices (such as lights, maglocks, elevators) be 'matrix facing' in order to let people interact with them without first actually having to enter a Host. Clarification on this seem to be needed since it have huge impact what you can and cannot do with the Spoof Command action.
This appears to be the intended reading.
However, thereīs some justified contention if a wireless active(!) device
- Can be 100% "inside" a host in the first place (note that the device could also be hardwired the host if it has some kind of physical "backbone" - which is probably a pretty common security setup anyways).
- Can still somehow be found in the Matrix without entering the host.
(Iīm sure that you are aware of this discussion, Xenon. Thatīs just a heads-up for the people just tuning in

)
My personal, 100% GM fiat/houserule preference:
A wireless active device inside a host can still be found in the Matrix due to its ongoing signal presence, but itīs masked by the host. Treat it as if itīs running silently, using the hosts sleaze rating to evade detection. Finding the device will lead the you the host. You still have to hack and enter the host to interact with the device in any further way. However, if you hack a device thatīs set up in this way with a direct connection, you will also get access to the host if youīre successfull, which can be exploited to get a quicker access into a layered host structure.This adds another reason for the existence of Matrix-facing devices as a part of the hostīs WAN, as well as another incentive for hackers to look for direct connections. Also, rule of cool when describing the Matrix iconography: Imagine a hackerīs Avatar crawling through the screen on the other end of a security camera

To establish a 'direct connection' to a device you connect a physical wire between your cyberdeck and the target device (or physically touch it if your Living Persona have the Skinlink Echo). It has also been suggested that you will automatically establish a 'direct connection' to wireless enabled device by just being in close proximity of it (seeing it / being within 10 meters of it). This seem to suggest that there is a 'mutual handshake range' similar to what we had back in 4th edition (but that this range does not seem to be based upon the noise distance table and the device rating cutoff range of both devices involved).
Huge fan of this, I hope that Banshee gets it through. Apart from hosts, it would also offer a nice way to solve the problem of low slave limits in "Consumer" PANs: A PAN could support and protect an unlimited direct connections (both shortrange wireless and wired), and the limit is just for "real" slaves that are remotely controlled over larger distances.
Those "real slaves" could also be enabled to further enhance your shortrange wireless capabilities, which allows for greater synergies between Hackers and other infiltration-oriented Team members.
A layered host does not seem to have 'matrix facing' 'access points' (if it did, then you would not have to go through the outer Host to reach the inner Host). It may still have slaved devices, but that they are always on the 'inside' (but that you can still use a 'direct connection' to gain access to the layered host without first accessing the outer Host(s).
Ah, there it is as well. Could have spared me the talk if I read it all the way through

Never say never, since there are other ways to protect these outside facing devices (faraday cages f.i.). Also, the Spider or (more often) the spiderīs corporate supervisor could be an idiot. Never underestimate human error

One question remains though: Maybe thereīs a 3rd option? Imagine Host A (The "Lobby"), Host B (Security) inside of it, and a camera.
The Camera
could be linked to the well-protected Host B, but on the "outside firewall" of it. That would mean that they are accessible from host A and B, but not from the broader Matrix. Also, while it uses the defense pools from Host B, (ab)using it an access point with a direct connection would still only get the hacker into Host A. While this is less secure for the camera, the spider could chose this setup to better protect his "castle" (Host B). This works better if you conceptualize Hosts as a bunch of layered (Fire)walls.
In addition to matrix connected Hosts that you may access wireless there also seem to be offline hosts running on physical hardware.
They seem to work in the same way as regular hosts, except that they by default don't seem to have any 'matrix facing' 'access points'.
To hack them (via Brute Force or Probe+Backdoor Entry and then take the 'Enter Host' action as you would with a normal Host) you first need to establish a 'direct connection' (see above) or possibly by attaching a wireless enabled Data Tap directly to the Host network (the server itself or to any device or any hard-wire used by the network) as this seem to suggest creating a 'matrix facing' 'access point'. Distance in this case will be measured between the device you use to 'access the Matrix' and the physical location of the wireless enabled Data Tap. Once you are inside the Host you will be considered 'directly connected' to all devices that are part of the network, no matter if they are wireless enabled or connected via physical wires.
Thatīs how Iīd handle these as well. Note that this could also potentially be used with all kinds of "closed systems" that are not explicitly labelled as "hosts", like Berlinīs Ominous Cable Matrix.
One last point would be the role of spiders, since they (thankfully) now have much more prominent role. Iīll post my thoughts on this later.