Defending against intrusions in template 1-IIIa
The edge template III-1-a
This template is also known under the name ziggurat.
|  |  |  |  |  |  |  |  |  | ||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  | ||||||||
Red has two main threats:
|  |  |  |  |  |  |  |  |  | ||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  | ||||||||
and
|  |  |  |  |  |  |  |  |  | ||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  |  | |||||||
|  |  |  |  |  | ||||||||
These moves lead to easy direct connection. Because there is no common hex used in both threats, Blue cannot prevent Red to link to the bottom.