SRD:Summon Nature's Ally VII

This spell functions like summon nature’s ally I, except that you can summon one 7th-level creature, 1d3 6th-level creatures of the same kind, or 1d4+1 lower-level creatures of the same kind.

This material is published under the OGL
Summon Nature's Ally VII
Conjuration (Summoning) [see text]
Level: Drd 7
Components: V, S, DF
Casting time: 1 round
Range: Close (25 ft. + 5 ft./2 levels)
Effect: One or more creatures, no two of which can be more than 30 ft. apart
Duration: 1 round/level (D)
Saving Throw: None
Spell Resistance: No

When you use a summoning spell to summon an air, chaotic, earth, evil, fire, good, lawful, or water creature, it is a spell of that type.

Summon Nature’s Ally


1st Level

2nd Level

3rd Level

4th Level

5th Level

6th Level

*Can’t cast irresistible dance

7th Level

*Can’t cast irresistible dance

8th Level

9th Level

*Can cast irresistible dance

  1. May be summoned only into an aquatic or watery environment.

Back to Main Page 3.5e Open Game Content System Reference Document Spells

Open Game Content (place problems on the discussion page).
This is part of the (3.5e) Revised System Reference Document. It is covered by the Open Game License v1.0a, rather than the GNU Free Documentation License 1.3. To distinguish it, these items will have this notice. If you see any page that contains SRD material and does not show this license statement, please contact an admin so that this license statement can be added. It is our intent to work within this license in good faith.
gollark: It's not ideal.
gollark: And AMD has the platform security processor.
gollark: I mean, all recent Intel CPUs have the Intel Management Engine, i.e. a mini-CPU with full access to everything running unfathomable code.
gollark: At some point you probably have to decide that some issues aren't really realistic or useful to consider, such as "what if there are significant backdoors in every consumer x86 CPU".
gollark: Presumably most of the data on the actual network links is encrypted. If you control the hardware you can read the keys out of memory or something (or the decrypted data, I suppose), but it's at least significantly harder and probably more detectable than copying cleartext traffic.
This article is issued from Dandwiki. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.