I. What’s New.. 1

A)    The Bridge Mode. 1

Procedure for the Bridge Mode. 1

B)    The Promiscuous Mode (with Hub or Mirroring Port) 3

II. Do You Know?  (5/5/2007) 4






I. What’s New


5/5/2007 Version 2.41-42 extends the operation spectrum by adding “Bridge Mode” and “Promiscuous Mode”


Though without the total controllability as in the Gateway mode, the newly-added two modes offer our users more operation freedom to adapt to the actual local area networks (LANs) and meet the task requirements without changing much of the existent networking structure.


A)      The Bridge Mode


This mode is also called “a machine-in–the-middle.” There is a bridging capability called the “Network Bridge” built into Windows XP. This is a feature of the Network Connections folder that allows a machine with two network interface cards (NIC) to act as a transparent bridge, connecting different local area network (LAN) segments and capturing all the traffic to and from one segment.


Procedure for the Bridge Mode


Step 1. Plan ahead and create a network bridge before the software installation (If you have installed the program, uninstall it first.)


After the NICs are installed and connected, open Control Panel, and click Network and Internet Connections and then Network Connections.




Next click both the network connections (using the Ctrl key), right-click one, and then click Bridge Connections.

After the completion of bridge configuration, the Network Connections window will look like the following one.


For more references and troubleshooting,

see http://www.microsoft.com/windowsxp/using/networking/expert/crawford_02april22.mspx.


Step 2. Install the software and set up the capturing NIC.


Go to Operation View, click Config, and you will see a window that looks like the one below.



There are three NICs shown in the table: One is the virtual NIC created as a result of bridging; and the other two are real NICs. If you are not sure which one is the external NIC capturing the traffic, you can try one by one by double-clicking them until there are data shown in Real-Time Log.


If you want to switch the operation from the Bridge mode to another one, the bridge connection must be deleted before enabling the changes.


B)      The Promiscuous Mode (with Hub or Mirroring Port)


For details, see the TupInsight part of our FAQ page at http://www.tupsoft.com/faq.htm.


II. Do You Know?  (5/5/2007)


1.       You can import the third-party blacklist (in Text File format) into our products for website access control.

2.       To monitor the complete chat content of the newer version of MSN, i.e., Windows Live Messenger, you need to upgrade to TupEnterprise.