• The Wi-Fi at the park is changing

  • In an effort to ensure our members and guest have the best internet experience while visiting our parks we are making changes to our network.

    The new network name is “TREPO – Guest
    There is no password for this network


    Why the name change?

    There are several reasons for the change but changing the name was to be able to move slowly to the new network and to have Wi-Fi names (SSIDs) at both Hodor and Suwannee Boat Ramp the same so that our members could auto-connect.


    What’s so great about the new network?

    Better coverage in the park at the pavilions and down by the water’s edge

    Client Isolation

    Prevent clients from infecting other computers if compromised

    Global Threat Management Protection against:

    Virus & Malware


    Threats from known, active botnets.


    Network traffic that indicates potential worm activity.


    Infiltrative software that steals internet activity data and other sensitive information from your network or computer.

    Mobile Malware

    Infiltrative software that steals internet activity data and other sensitive information from your network or mobile device.


    Malicious software that exhibits clear criminal intent.

    Blocking unwanted traffic:


    Peer-to-peer traffic.


    Network traffic sent to and from Tor exit nodes using an IP-based rule set.

    Blocking Hacking Attempts:


    Generic exploits that do not adhere to a specific service category.


    Targeting of vulnerable processes being run on a separate machine, local network, or intranet.


    Denial of Service (DoS) attempts on or within your network.


    Website Blocking:

    Adult Content

    P2P & Illegal

    Terrorism & Hate

    Hacking & Cracking

    Enforce “SafeSearch”


    Command and Control botnet hosts. Prevents receiving commands for already infected machines. Helps identify infected machines.


    Sites that serve files or host applications that force the web browser to mine cryptocurrency, often utilizing considerable system, network, and power resources.


    Malicious software including drop servers and compromised websites that can be accessed via any application, protocol, or port. Includes drive-by downloads and adware.

    Phishing & Deception

    Fraudulent websites that aim to trick users into handing over personal or financial information.

    Proxy & Filter Avoidance

    Sites that provide information or a means to circumvent DNS-based content filtering, including VPN and anonymous surfing services.