![]() ![]() The sewer manhole by the maintenance and repair point (PTOR) is an exfil spot thatĪnybody can use. The prerequisite for exfil here is pretty fun, as PMCs need at least one friendly Scav toĮxtract, while Scavs need one friendly PMC instead.Īdmittedly, Scavs have an easier time maneuvering the It’s always available and needs no requirements, but has oneĬaveat: you can’t have any backpack equipped when extracting through here. For Scav-exclusive extraction points, there are no requirements for extraction. The North Checkpoint close to the Maintenance and Repair Point The first one that comes to mind is the CPįence. You may have to lookĪround and navigate a bit to find the extraction point, but seeing as there’s Underground location that’s right smack below bunker. No caveat to it, it’s definitely well worth it. Lastly, there’s a hole in the fence by the mountains. Like the other Scav exit points, there are no requirements for Portion of the map, close to the short-range anti-aircraft missiles andĪrtillery. You can find this in the northern area of the map, More difficult time within the Reserve because there’s only one PMC-exclusive exfil spot: the cliff descent. While it’s PMC-only, it does have its drawbacks. For one, you will need 1 Paracord as well as 1 Red Rebel Ice Pick to be able to use this exfil. ![]() ![]() There’s also the caveat of not having any armor vest equipped for this extraction. PMCs may as well choose one of the exfil spots for all, but if push comes to shove, this is an option you can consider. There are a lot of discussions to be had when it comes to the EFT Reserve map, but the extraction points are certainly one of the most crucial. Whether you play Scav or PMC, what’s important is that you plan your raid ahead of time and score some great loot in the end. Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. The cookie is used by cdn services like CloudFare to identify individual clients behind a shared IP address and apply security settings on a per-client basis. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |