Garry Tonon Leg Lock to Back System is a advanced difficulty Attack System system. Integrates 5 components.

System ID: System Type: Attack System Difficulty Level: Advanced

What is Garry Tonon Leg Lock to Back System?

The Garry Tonon Leg Lock to Back System represents one of the most sophisticated attack frameworks in modern no-gi Brazilian Jiu-Jitsu. This system creates a continuous threat cycle between lower body submissions and back control, forcing opponents into a constant state of defensive decision-making. When an opponent defends the leg attack, they expose pathways to the back. When they defend the back attack, they expose the legs again. The system is built on the principle that no position is terminal—every defensive movement creates an offensive opportunity. Tonon developed this approach through years of high-level competition, recognizing that opponents who successfully defend one attack category often do so by compromising their defense in another area. The beauty of this system lies in its adaptability: it works from standing exchanges, guard passing scenarios, and scrambles. Rather than viewing leg locks and back attacks as separate skillsets, this framework treats them as interconnected components of a unified offensive strategy. Practitioners learn to flow seamlessly between ashi garami variations, truck positions, and back control, maintaining offensive pressure regardless of which position they occupy.

Core Principles

  • Attack cycling between lower body submissions and back control creates inescapable dilemmas
  • Defensive movements against leg locks naturally expose back taking opportunities
  • Back escape attempts frequently re-expose leg entanglement positions
  • Connection maintenance throughout transitions prevents opponent’s positional reset
  • Off-balancing precedes all major transitions to reduce defensive effectiveness
  • Control hierarchies shift based on opponent’s defensive priorities
  • Submission threats force movement which enables position advancement

Key Components

Inside Ashi to Back Transition (Primary entry to back control from leg entanglement positions) The fundamental pathway from inside ashi-garami to back control. When opponent attempts to clear the bottom leg hook, their rotation creates exposure for seat belt grip establishment. This transition capitalizes on the forward roll escape attempt, using their momentum to achieve rear mount positioning. The key is maintaining connection with the far hip throughout the rotation.

Saddle to Truck Connection (Converts heel hook defense into truck position and twister threats) When opponents defend the heel hook by turning into the position, their defensive turn exposes the truck position. This component teaches recognizing the exact moment when heel hook pressure should be released to capitalize on truck entries. The lockdown-style leg configuration from saddle translates directly into truck control mechanics, making this one of the highest percentage connections in the system.

Back Control to Leg Reentry (Recaptures leg entanglement when back control is escaped) When opponents escape back control by turning into you or executing granby rolls, their leg configuration during these escapes creates immediate leg entanglement opportunities. This component focuses on recognizing which escape direction leads to which ashi variation. Forward granby typically exposes outside ashi, while backward rolls create inside ashi opportunities. Maintaining leg contact throughout back escape attempts is critical.

X-Guard to Ashi Transition (Establishes offensive positioning from standing or guard scenarios) The system incorporates x-guard and single leg x-guard as transitional positions that bridge standing entries to leg locks or sweeps to back attacks. From x-guard, the bottom hook can be converted to inside ashi when opponent attempts to pass. From single leg x, the elevated leg position creates entries to saddle or outside ashi. These positions serve as offensive hubs that threaten multiple attack categories simultaneously.

Kiss of the Dragon Back Take (Dynamic back entry that maintains offensive continuity from leg attacks) This dynamic rolling back take serves as both an entry to back control and a reconnection point when leg attacks are initially defended. The inversion underneath opponent’s base while maintaining leg connection creates the momentum needed to achieve back mount. The technique requires precise timing and hip elevation to prevent being flattened during the roll. It works particularly well when opponent is defending leg attacks by attempting to pressure pass.

Implementation Sequence

  1. Entry Establishment: Establish initial control position through standing leg attacks, guard pulling to x-guard variations, or transitional leg entanglements during scrambles Key points:
  • Prefer inside ashi-garami as primary starting position for bilateral attack options
  • Use single leg x-guard when opponent maintains strong posting base
  • Control opponent’s near hip to prevent immediate escape rolling
  • Establish leg triangle configuration before attempting submissions
  1. Initial Submission Threat: Apply heel hook, kneebar, or straight ankle lock pressure based on ashi variation and opponent’s leg configuration Key points:
  • Submission attempts must be legitimate threats that force defensive reactions
  • Monitor opponent’s upper body rotation and hip turning responses
  • Maintain connection with far hip even while focusing on leg attack
  • Recognize defensive patterns: forward turn vs backward turn vs base widening
  1. Transition Recognition: Identify which defensive response opponent employs and select appropriate transition pathway to either back or alternative leg position Key points:
  • Forward turns toward you expose back taking with seat belt grip
  • Backward turns away expose truck position entries
  • Base widening and posting creates kiss of the dragon opportunities
  • Hip clears without rotation indicate need to switch ashi variations
  1. Position Conversion: Execute the identified transition while maintaining continuous connection and control throughout the movement Key points:
  • Release leg submission grip only when next control point is secured
  • Use opponent’s defensive momentum to facilitate position changes
  • Keep hips connected throughout transitions to prevent space creation
  • Establish primary control points before attempting secondary submissions
  1. Secondary Attack Application: Apply back attack submissions or alternative leg locks from newly achieved position Key points:
  • From back control, threaten rear naked choke while monitoring leg exposure
  • From truck, threaten twister while maintaining ability to return to legs
  • Chain multiple submission attempts within same position family
  • Force opponent into next defensive cycle that reopens previous attack category
  1. Cycle Continuation: Recognize when opponent’s current defensive response creates opportunity to return to previous attack category, maintaining the perpetual threat cycle Key points:
  • Back escapes via granby or turn-in expose leg entanglements
  • Successful leg attack defenses often compromise upper body control
  • System mastery means never accepting neutral position resets
  • Each defensive success by opponent should lead to next offensive opportunity

What Challenges Will You Face?

  • Opponent stalls in defensive turtle position, preventing both leg locks and back attacks from being fully established: Use front headlock control as intermediate position that threatens both anaconda/darce chokes and back takes via alternative pathways. The turtle becomes another position within the cycle rather than an escape route.
  • Losing connection during transitions allows opponent to reset to neutral standing or open guard positions: Develop superior hip connection and weight distribution throughout transitions. Every transition should involve a moment where both old and new control points are simultaneously established before releasing the first grip.
  • Insufficient finishing rate on individual submissions reduces system effectiveness as opponents become comfortable defending without consequence: Dedicate separate training time to isolated submission finishing mechanics. The system’s transitions require legitimate submission threats—if opponents don’t fear the finish, they won’t make defensive movements that expose transitions.
  • Over-committing to one attack category allows opponent to specialize their defense and escape the system’s dilemma structure: Maintain balanced threat distribution by tracking personal tendency toward legs vs back. Force yourself to alternate attack categories even when one feels more successful, ensuring opponent must maintain comprehensive defensive awareness.
  • Opponents who accept heel hook exposure while countering the back take, or vice versa, breaking the system’s foundational dilemma: Immediately capitalize on whichever attack they’re conceding. If they accept heel hook risk to prevent back exposure, finish the heel hook efficiently. This forces them to defend both categories rather than sacrificing one.

How to Measure Your Progress

Transition Success Rate: Percentage of leg attack attempts that successfully convert to back control when initially defended, or back control attempts that successfully return to leg attacks when escaped Proficiency indicators:

  • Beginner: 20-30% conversion rate with noticeable position resets between attempts
  • Intermediate: 50-60% conversion rate with maintained connection during transitions
  • Advanced: 75%+ conversion rate with seamless flow and multiple transition options per defensive response
  • Expert: Near 90% conversion rate with ability to chain 3+ positions within single sequence

Defensive Response Recognition: Ability to immediately identify which transition pathway is exposed by opponent’s current defensive movement Proficiency indicators:

  • Beginner: Recognizes transitions only after opponent has fully committed to escape movement
  • Intermediate: Identifies correct transition option during early phase of defensive response
  • Advanced: Anticipates which defense opponent will employ based on positional cues and body language
  • Expert: Manipulates opponent’s defensive choices through feinting and pressure variation to expose desired transitions

Submission Finishing Efficiency: Percentage of fully established submission attempts that result in tap or technical completion Proficiency indicators:

  • Beginner: 30-40% finish rate when position is fully established
  • Intermediate: 60-70% finish rate with refined breaking mechanics
  • Advanced: 80%+ finish rate with ability to finish from suboptimal positions
  • Expert: Near 95% finish rate when position is achieved, forcing opponent to defend before full establishment

Connection Maintenance: Ability to maintain hip and leg contact throughout all transitions preventing opponent’s positional reset Proficiency indicators:

  • Beginner: Frequent connection breaks requiring position reestablishment
  • Intermediate: Maintains primary connection points but loses secondary controls during transitions
  • Advanced: Simultaneous old and new position control during all major transitions
  • Expert: Multi-layered connection redundancy where losing one control point still maintains offensive capability

How to Train This System Effectively

Drilling Approach

The system requires both isolated component drilling and integrated flow training. Begin each session with 10-15 minutes of specific submission finishing mechanics from static positions—heel hooks from saddle, rear naked choke from back control, etc. Follow with transitional drilling where partner provides specific defensive responses: heel hook defense via forward turn, back escape via granby roll, etc. Practice the designated transition pathway 5-10 repetitions per side before switching defensive scenarios. Conclude with 15-20 minute flow rounds where you maintain the system’s positions and transitions while partner provides 30-50% resistance, focusing on smooth transitions rather than submission finishes. This progression from static to dynamic training ensures both technical precision and adaptive flow development.

Progression Path

Foundation Development (Focus: Master individual positions independently: inside ashi control and heel hook, outside ashi control and heel hook, saddle position and heel hook finishing, back control and rear naked choke mechanics) - 8-12 weeks of dedicated positional training Binary Connections (Focus: Develop specific two-position relationships: inside ashi to back, saddle to truck, back to leg reentry. Drill these connections repeatedly until they become automatic responses to defensive movements) - 12-16 weeks of transition-focused training Complete Cycle Integration (Focus: Link all positions into continuous attack cycles. Practice maintaining offensive pressure through 3-4 position changes within single sequence. Develop ability to recognize and execute multiple pathway options from each position) - 16-24 weeks of system integration Strategic Application (Focus: Implement system during live training with progressive resistance. Develop strategic decision-making about which positions to emphasize based on opponent’s defensive tendencies. Refine submission finishing under live conditions) - 24+ weeks of competitive application and refinement Advanced Adaptation (Focus: Customize system based on personal attributes and opponent patterns. Develop unique variations and entries specific to your game. Integrate system with guard passing, takedowns, and other positional frameworks) - Ongoing development throughout competitive career

Common Mistakes

  • Abandoning leg attack position prematurely before opponent’s defensive commitment is clear, resulting in unnecessary position resets
  • Over-gripping during transitions causes slow, telegraphed movements that allow opponent to establish defensive frames
  • Focusing exclusively on submission attempts without maintaining positional control and transition readiness
  • Failing to recognize that some defensive responses require patience and position consolidation rather than immediate transition
  • Attempting complex transition pathways before mastering basic binary connections between primary positions
  • Neglecting back attack development in favor of leg locks, creating one-dimensional threat profile
  • Insufficient hip connection during transitions allows opponent space to escape system entirely