Edge template IV2h

The template:

 (From: www.drking.org.uk)

Red has two threats:



using III-2-d and



also using III-2-d.

Since there is no overlapping field, Blue can't block Red's connection.