• The Wi-Fi at the park is changing

  • In an effort to ensure our members and guest have the best internet experience while visiting our parks we are making changes to our network.

    The new network name is “TREPO – Guest
    There is no password for this network

     

    Why the name change?

    There are several reasons for the change but changing the name was to be able to move slowly to the new network and to have Wi-Fi names (SSIDs) at both Hodor and Suwannee Boat Ramp the same so that our members could auto-connect.

     

    What’s so great about the new network?

    Better coverage in the park at the pavilions and down by the water’s edge

    Client Isolation

    Prevent clients from infecting other computers if compromised

    Global Threat Management Protection against:

    Virus & Malware

    Botcc

    Threats from known, active botnets.

    Worm

    Network traffic that indicates potential worm activity.

    Malware

    Infiltrative software that steals internet activity data and other sensitive information from your network or computer.

    Mobile Malware

    Infiltrative software that steals internet activity data and other sensitive information from your network or mobile device.

    Trojan

    Malicious software that exhibits clear criminal intent.

    Blocking unwanted traffic:

    P2P

    Peer-to-peer traffic.

    TOR

    Network traffic sent to and from Tor exit nodes using an IP-based rule set.

    Blocking Hacking Attempts:

    Exploit

    Generic exploits that do not adhere to a specific service category.

    Shellcode

    Targeting of vulnerable processes being run on a separate machine, local network, or intranet.

    DoS

    Denial of Service (DoS) attempts on or within your network.

     

    Website Blocking:

    Adult Content

    P2P & Illegal

    Terrorism & Hate

    Hacking & Cracking

    Enforce “SafeSearch”

    Botnet

    Command and Control botnet hosts. Prevents receiving commands for already infected machines. Helps identify infected machines.

    Cryptomining

    Sites that serve files or host applications that force the web browser to mine cryptocurrency, often utilizing considerable system, network, and power resources.

    Malware

    Malicious software including drop servers and compromised websites that can be accessed via any application, protocol, or port. Includes drive-by downloads and adware.

    Phishing & Deception

    Fraudulent websites that aim to trick users into handing over personal or financial information.

    Proxy & Filter Avoidance

    Sites that provide information or a means to circumvent DNS-based content filtering, including VPN and anonymous surfing services.