Sponsored Links

Anyone a Trooli Customer?

Update - I simply plugged my TP Link into my Trooli router and everything works like magic. Disabled Wi-FI on the Trooli router via the admin hub and the signal is amazing across the whole house with the TP Link.

I'm sure that's not the most elegant solution but it was a damn sight easier!
 
FYI I was recently supplied with a DGA4135 from trooli, the engineer password was underneath the tooli wifi sticker View attachment 8550
I just signed up to Trooli and received the DGA4135 as well. I can SSH in with the engineers account without any issues, however when I run 'top' its not returning any values with the PPPoE username and password. Did you manage to obtain your information this way?

Edit: I should also mention that the router hasnt connected to the fibre yet, its not installed until Wednesday.

Code:
Product: vcnt-j
Release: Damson (19.5)
Version: 19.5.1017




engineer>top
Mem: 371488K used, 137880K free, 264K shrd, 18220K buff, 65944K cached
CPU:   3% usr   6% sys   0% nic  90% idle   0% io   0% irq   0% sirq
Load average: 0.04 0.09 0.13 1/136 13127
  PID  PPID USER     STAT   VSZ %VSZ %CPU COMMAND
 5684     1 root     S    51604  10%   3% hostapd -bund -p /var/run/hostapd.pid                                                                         -e /tmp/hostapd.env
11862     1 root     S    33972   7%   3% /usr/bin/multiap_agent -m ubus
12452     1 root     S    70808  14%   0% /usr/bin/cwmpd
11264     1 root     S    44292   9%   0% /usr/bin/multiap_controller -m ubus
11413     1 root     S    35688   7%   0% /usr/bin/dlnad -f /var/etc/dlnad.conf
 7920     1 root     S    31400   6%   0% lua /usr/bin/transformer
 9405     1 root     S    24668   5%   0% /usr/bin/nqnd
 9406     1 root     S    24648   5%   0% /usr/bin/nqcs
10367     1 root     S    12292   2%   0% /usr/sbin/urlfilterd
10096     1 root     S    12136   2%   0% /usr/sbin/dnsfilterd
10350 10258 nobody   S     9468   2%   0% nginx: worker process
 8357     1 root     S     7932   2%   0% {mobiled} /usr/bin/lua /usr/bin/mobile                                                                        d
10524     1 root     S     7880   2%   0% lua /usr/bin/gre-hotspotd.lua
 8061     1 root     S     7032   1%   0% {lte-doctor-logg} /usr/bin/lua /usr/bi                                                                        n/lte-doctor-logger
 4297     1 root     S     6676   1%   0% /sbin/logd -S 4096 -W 30000
13101 13077 engineer S     6636   1%   0% lua /usr/bin/clash
 7866     1 root     S     5924   1%   0% lua /usr/bin/lcmd
 4940     1 root     S     5792   1%   0% lua /usr/bin/hostmanager.lua
 4225     1 root     S     5732   1%   0% {ledfw.lua} /usr/bin/lua /sbin/ledfw.l                                                                        ua
10258     1 root     S     5700   1%   0% nginx: master process /usr/sbin/nginx                                                                         -c /etc/nginx/nginx.conf -g daemon off;
  268     1 root     S     5508   1%   0% /usr/sbin/cgrulesengd -n -Q -u root
 7072  6690 root     S     5484   1%   0% {mobiled.lua} /usr/bin/lua /lib/netifd                                                                        /mobiled.lua -s 0 -p 1 -i wwan
 7962     1 root     S     5460   1%   0% {datausaged} /usr/bin/lua /usr/bin/dat                                                                        ausaged
11921     1 root     S     5436   1%   0% lua /usr/bin/pinholehelper.lua
11951     1 root     S     5436   1%   0% lua /usr/bin/redirecthelper.lua
 7741     1 root     S     5432   1%   0% {datausage_notif} /usr/bin/lua /usr/bi                                                                        n/datausage_notifier
 5367     1 root     S     5432   1%   0% {interceptd} /usr/bin/lua /usr/bin/int                                                                        erceptd
11504     1 root     S     5408   1%   0% lua /usr/sbin/lxc_monitor.lua
12453     1 root     S     5408   1%   0% lua /usr/bin/cwmpevents
 4217     1 root     S     3876   1%   0% {status-led-even} /usr/bin/lua /sbin/s                                                                        tatus-led-eventing.lua
11457     1 root     S<    3616   1%   0% /usr/sbin/ntpd -n -N -l -S /usr/sbin/n                                                                        tpd-hotplug -p 0.openwrt.pool.ntp.org -p 1.openwrt.pool.ntp.org
11316     1 root     S     3436   1%   0% {time_change_mon} /usr/bin/lua /sbin/t                                                                        ime_change_monitor.lua
13126  7920 root     R     3392   1%   0% /usr/bin/top -b -n 1
13102 11316 root     S     3260   1%   0% sleep 10
11547 11505 root     S     3228   1%   0% /bin/sh /sbin/init
11401     1 root     S     3164   1%   0% mmpbxfwctl
    1     0 root     S     3124   1%   0% /sbin/procd
13125 11547 root     S     3096   1%   0% sleep 10
11505     1 root     S     3060   1%   0% lxc-start -F -n lxc_ee
 4873     1 root     S     3040   1%   0% /usr/bin/bcmubusbridge
 9578     1 dnsmasq  S     2932   1%   0% /usr/sbin/dnsmasq -C /var/etc/dnsmasq.                                                                        conf.dnsmasq -k -x /var/run/dnsmasq/dnsmasq.dnsmasq.pid
 9584  9578 root     S     2932   1%   0% /usr/sbin/dnsmasq -C /var/etc/dnsmasq.                                                                        conf.dnsmasq -k -x /var/run/dnsmasq/dnsmasq.dnsmasq.pid
 4790     1 root     S     2888   1%   0% debug_monitor /root
 8780     1 root     S     2868   1%   0% /usr/sbin/igmpproxy
 9093     1 root     S     2864   1%   0% /usr/sbin/mldproxy
 6690     1 root     S     2796   1%   0% /sbin/netifd
13077  8281 root     S     2612   1%   0% /usr/sbin/dropbear -F -P /var/run/drop                                                                        bear.1.pid -g -j -w -p 192.168.1.1:22 -I 600 -T 3
 7624     1 root     S     2584   1%   0% /usr/sbin/odhcpd
  190     1 root     S     2556   1%   0% /sbin/ubusd
 8160     1 root     S     2544   0%   0% /usr/bin/neighmd -m 0x7
 801
6     1 root     S     2544   0%   0% /usr/bin/dhcpsnooper -q 1
 8281     1 root     S     2484   0%   0% /usr/sbin/dropbear -F -P /var/run/drop                                                                        bear.1.pid -g -j -w -p 192.168.1.1:22 -I 600 -T 3
10693     1 root     S     2460   0%   0% /usr/bin/fseventd -d
 4908     1 root     S     2428   0%   0% /usr/bin/dhcpopassthrud
 8102     1 root     S     2392   0%   0% /usr/bin/mcsnooper
11546     1 root     S     2220   0%   0% /sbin/mountd -f
  207     1 root     S     2108   0%   0% /sbin/urngd
 8278     1 root     S     2076   0%   0% xl2tpd -D -l -p /var/run/xl2tpd.pid
 3847     1 root     S     2044   0%   0% /usr/sbin/watchdog-tch -c /var/etc/wat                                                                        chdog.conf --foreground
   51     2 root     SW       0   0%   0% [ubi_bgt0d]
   50     2 root     SW       0   0%   0% [kworker/1:1]
 4687     2 root     SW       0   0%   0% [wl0-kthrd]
   22     2 root     SW       0   0%   0% [kworker/0:1]
  463     2 root     SW       0   0%   0% [bcmsw_rx]
  415     2 root     RW       0   0%   0% [fc_timer]
    7     2 root     SW       0   0%   0% [rcu_preempt]
 4736     2 root     SW       0   0%   0% [dhd_watchdog_th]
  429     2 root     SW       0   0%   0% [bcm_archer_us]
   26     2 root     SW       0   0%   0% [skb_free_task]
   48     2 root     SW       0   0%   0% [kworker/u6:1]
   10     2 root     SW       0   0%   0% [migration/0]
   11     2 root     SW       0   0%   0% [migration/1]
  464     2 root     SW       0   0%   0% [bcmsw_recycle]
   12     2 root     SW       0   0%   0% [ksoftirqd/1]
  151     2 root     SW       0   0%   0% [kworker/u6:2]
   49     2 root     SW       0   0%   0% [kworker/2:1]
    3     2 root     SW       0   0%   0% [ksoftirqd/0]
  423     2 root     SW       0   0%   0% [bcmFlwStatsTask]
  511     2 root     SW       0   0%   0% [enet-kthrd]
 5718     2 root     SW       0   0%   0% [kworker/1:2]
    2     0 root     SW       0   0%   0% [kthreadd]
    5     2 root     SW<      0   0%   0% [kworker/0:0H]
    8     2 root     SW       0   0%   0% [rcu_sched]
    9     2 root     SW       0   0%   0% [rcu_bh]
   14     2 root     SW<      0   0%   0% [kworker/1:0H]
   15     2 root     SW       0   0%   0% [migration/2]
   16     2 root     SW       0   0%   0% [ksoftirqd/2]
   17     2 root     SW       0   0%   0% [kworker/2:0]
   18     2 root     SW<      0   0%   0% [kworker/2:0H]
   19     2 root     SW<      0   0%   0% [khelper]
   20     2 root     SW<      0   0%   0% [netns]
   21     2 root     SW<      0   0%   0% [writeback]
   23     2 root     SW<      0   0%   0% [crypto]
   24     2 root     SW<      0   0%   0% [bioset]
   25     2 root     SW<      0   0%   0% [kblockd]
   27     2 root     SW<      0   0%   0% [linkwatch]
   28     2 root     SWN      0   0%   0% [kswapd0]
   29     2 root     SW       0   0%   0% [fsnotify_mark]
   45     2 root     SW       0   0%   0% [bpm_monitor]
   46     2 root     SW<      0   0%   0% [ipv6_addrconf]
   47     2 root     SW<      0   0%   0% [deferwq]
   54     2 root     SW       0   0%   0% [kworker/0:2]
   55     2 root     SW<      0   0%   0% [kworker/1:1H]
   56     2 root     SW<      0   0%   0% [kworker/0:1H]
   93     2 root     SW       0   0%   0% [ubifs_bgt0_1]
  372     2 root     SW<      0   0%   0% [cryptodev_queue]
  401     2 root     SW       0   0%   0% [fc_evt]
  430     2 root     SW       0   0%   0% [bcm_archer_wlan]
  457     2 root     SW       0   0%   0% [bcmxtm_recycle]
  460     2 root     SW       0   0%   0% [bcmxtm_rx]


Edit 2:

I ended up setting up a PPPoE server on an old Mikrotik and doing a packet capture to get a bit more information. It looks like there are some generic credentials used (acs@cfsbroadband.co.uk) ACS im assuming is for their automatic configuration server/service. The host-unique ID is also being sent, im guessing that the PPPoE details will be pushed back to the router after its been registered and configured using their ACS.
 
Last edited:
Just spoke to a Trooli rep. He was very helpful.
I enquired about CG NAT on IPv4 as this seemed to be a bit of a unknown and I have a very old Lynksys ATA for my Voip phones before i even thought about IPV6 for every day use. He confirmed Trooli have CG NAT which isn't a huge surprise so there is the potential for issues. So it might be a good idea to go IPV6 ready with VOIP equipment to avoid the port forwarding nightmare or expect issues.

Ironically they even offered the PPPOE details when I brought this up and I didn't even ask for it, so it looks like they are loosening up on this!!
 
For anyone else wanting to use their own router with Trooli things have moved on.

All you need to do is email the HelpDesk and request the PPOE log in details , they'll ask you to confirm that you accept their conditions ie. you accept full responsibility for your own kit and keep their router for testing purposes.
 
Well I have my Trooli Router and will hopefully be getting installed soon. if they stick to the date.

I also noted that they currently set the WiFi SSID as trooli (and your customer reference number) which when I saw that on the sticker immediately tried to reset to factory defaults, unfortunately that has been set as the default but I have changed it. back to what was on the label underneath.

That's seriously bad practice to make such info public like that. plus the wifi password is pretty short and weak. the default is much better if more annoying, you also need to disable the wifi boosters auto connect and sync thing in order to be able to disable the WPS pin which is a huge gaping security issue.

you can also disable their ability remote control the router if you sign in with the engineer account. I forget what the thing to do that is called in the menu's off the top of my head.
 
I can't fault the Trooli connection. The install was pretty smooth, No sign of CG-NAT on IPv4. loads of IPV6 addresses if you need them. 6ms pings to most UK services which is better than a over the BT network or Talk Talk networks. No evidence as yet of any traffic management. Getting 930Mbps down and 329 Mbps up through my own OpenWRT based router.

Just peal off the Trooli sticker off the back of the router and log into the router via SSH with SSH engineer@192.168.1.1 ( then enter the admin password under the sticker worked great on my linux distro) or Putty on windows. make your terminal window full screen to make it easy to see then type > top and find the PPP info there or ask Trooli support. you'll get the PPPOE info either way now.
 
Top
Cheap BIG ISPs for 100Mbps+
Community Fibre UK ISP Logo
150Mbps
Gift: None
Virgin Media UK ISP Logo
Virgin Media £26.00
132Mbps
Gift: None
Shell Energy UK ISP Logo
Shell Energy £26.99
109Mbps
Gift: None
Plusnet UK ISP Logo
Plusnet £27.99
145Mbps
Gift: None
Zen Internet UK ISP Logo
Zen Internet £28.00 - 35.00
100Mbps
Gift: None
Large Availability | View All
Cheapest ISPs for 100Mbps+
Gigaclear UK ISP Logo
Gigaclear £17.00
200Mbps
Gift: None
YouFibre UK ISP Logo
YouFibre £19.99
150Mbps
Gift: None
Community Fibre UK ISP Logo
150Mbps
Gift: None
BeFibre UK ISP Logo
BeFibre £21.00
150Mbps
Gift: £25 Love2Shop Card
Hey! Broadband UK ISP Logo
150Mbps
Gift: None
Large Availability | View All

Helpful ISP Guides and Tips

Sponsored Links
The Top 15 Category Tags
  1. FTTP (5507)
  2. BT (3513)
  3. Politics (2534)
  4. Openreach (2296)
  5. Business (2259)
  6. Building Digital UK (2243)
  7. FTTC (2042)
  8. Mobile Broadband (1970)
  9. Statistics (1787)
  10. 4G (1662)
  11. Virgin Media (1615)
  12. Ofcom Regulation (1458)
  13. Fibre Optic (1393)
  14. Wireless Internet (1388)
  15. FTTH (1381)
Sponsored

Copyright © 1999 to Present - ISPreview.co.uk - All Rights Reserved - Terms  ,  Privacy and Cookie Policy  ,  Links  ,  Website Rules