-
In an effort to ensure our members and guest have the best internet experience while visiting our parks we are making changes to our network.
The new network name is “TREPO – Guest”
There is no password for this networkWhy the name change?
There are several reasons for the change but changing the name was to be able to move slowly to the new network and to have Wi-Fi names (SSIDs) at both Hodor and Suwannee Boat Ramp the same so that our members could auto-connect.
What’s so great about the new network?
Better coverage in the park at the pavilions and down by the water’s edge
Client Isolation
Prevent clients from infecting other computers if compromised
Global Threat Management Protection against:
Virus & Malware
Botcc
Threats from known, active botnets.
Worm
Network traffic that indicates potential worm activity.
Malware
Infiltrative software that steals internet activity data and other sensitive information from your network or computer.
Mobile Malware
Infiltrative software that steals internet activity data and other sensitive information from your network or mobile device.
Trojan
Malicious software that exhibits clear criminal intent.
Blocking unwanted traffic:
P2P
Peer-to-peer traffic.
TOR
Network traffic sent to and from Tor exit nodes using an IP-based rule set.
Blocking Hacking Attempts:
Exploit
Generic exploits that do not adhere to a specific service category.
Shellcode
Targeting of vulnerable processes being run on a separate machine, local network, or intranet.
DoS
Denial of Service (DoS) attempts on or within your network.
Website Blocking:
Adult Content
P2P & Illegal
Terrorism & Hate
Hacking & Cracking
Enforce “SafeSearch”
Botnet
Command and Control botnet hosts. Prevents receiving commands for already infected machines. Helps identify infected machines.
Cryptomining
Sites that serve files or host applications that force the web browser to mine cryptocurrency, often utilizing considerable system, network, and power resources.
Malware
Malicious software including drop servers and compromised websites that can be accessed via any application, protocol, or port. Includes drive-by downloads and adware.
Phishing & Deception
Fraudulent websites that aim to trick users into handing over personal or financial information.
Proxy & Filter Avoidance
Sites that provide information or a means to circumvent DNS-based content filtering, including VPN and anonymous surfing services.