Defending against intrusions in template 1-IIIb
The edge template III-1-b
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
Red has two main threats:
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
and
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ||||||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
These moves lead to easy direct connection. Because there is no common hex used in both threats, Blue cannot prevent Red to link to the bottom.