Predator DNC Onsite Preparation

Predator DNC Onsite Preparation


To help prepare for your onsite Predator DNC installation, it is recommended you read the following article. The technician will implement features detailed in the scope. Features such as drip-feed must be defined in the scope to be configured by the SFA technician. Feel free to ask a SFA technician any questions.

System Requirements

  1. For a complete list of system requirements, review Predator Software System Requirements.
  2. SFA recommends a Windows service account with local administrator rights, read & execute/write to all applicable part program directories and doesn't expire.
  3. SFA recommends the Server/PC is dedicated to Predator applications.
  4. If using Anti-Virus software or third-party firewalls, ensure exceptions can be made for Predator applications and their supporting drivers.


  1. The Predator DNC application will use a temporary license until you receive the permanent USB SIM which is issue shortly after the final payment. Review How to Obtain Network ID to License Predator Products to obtain the information needed for a SFA technician to request a temporary license. 
  2. Virtual Machines (VM) are supported as long as a USB port is available to the VM at all times. Review USB Port Options for Virtual Machines for more information or contact SFA Support.
  3. Installations utilizing a Floating License Manager (FLM) will only need a USB port on the FLM server.

Network Infrastructure

  1. Static IP addresses are used for all network-based hardware and CNC machines. Each device and/or CNC machine will require its own static IP address.
  2. Communication protocols to CNC machines typically require some TCP ports be open
    1. The most common TCP ports used by Predator DNC are 21, 80, 445, 950, 951, 966, 967, 1391, 8008, 8190, 8191, 8192, 8193, & 50000-51000.
    2. The most common protocols used by Predator DNC are FTP, SMBv1, & SMBv2.

Wireless Hardware Preparation

This section ONLY applies to wireless hardware, if you purchased wired hardware, read the section below
  1. Wireless access points (WAP) are installed and ready.
  2. SSID and encryption information will be provided to the SFA technician upon arrival.
  3. All CNC machines have line of sight to a WAP.
  4. If MAC address filtering is used, you must notify the SFA technician upon arrival.

Wired Hardware Preparation

This section ONLY applies to wired hardware, if you purchased wireless hardware, read the section above
  1. Ethernet drops are present and located within 5 feet of serial or Ethernet port.
  2. If using a female Ethernet drop (i.e. biscuit, keystone jack), patch cables must be provided.
  3. Ensure all Ethernet drops are patched into switch.
  4. Ensure all switch ports are tagged for the correct VLAN.

CNC Requirements

  1. Edit lock keys must be present during the installation and required for most remote request implementations
  2. CNC machines must be able to be powered on and fully usable
  3. For CNC machines requiring hardware, a 110vac outlet or 24vdc is required
    1. Okuma CNC machines require a 110vac outlet.
    2. Fanuc CNC machines can use a Fanuc power cable in lieu of the above requirement, please inform your Account Executive if this is desired.
    3. 110vac outlets must be within 5 feet of the serial or Ethernet port.
    4. 12-48vdc is only used when the hardware is mounted internally, and the CNC machine has power to spare.

Part Programs and Directories

  1. Predator DNC can use most existing part program directories.
  2. UNC paths are required in most instances.
  3. If using remote request, file name must be easily typed at CNC machine control.
  4. The SFA technician can help create a part program directory while onsite as well as provide recommendations to modify existing directories.
  5. All file management is handled by Windows File Explorer so permissions must be assigned by your IT staff; here are some recommendations
    1. Predator DNC Server and/or Windows service account: read & execute/write to both uploads and downloads folders
    2. Programmers/Supervisors: read & execute/write to both uploads and downloads folders
    3. Operators: read & execute to downloads folders

Personnel Needed for a Successful Implementation

  1. IT Contact
  2. Maintenance Contact
  3. CNC Programmer
  4. Machine Shop Supervisor
  5. Operator

Information to Have Ready When Technician Arrives

  1. A range of static IP addresses; one for each device and/or network-based CNC machine
  2. Local Administrator Rights
  3. Windows Service Account
  4. SSID and Encryption Key (for wireless hardware only)
  5. Location of current NC part programs

Typical Installation Plan


    1. A meeting will be scheduled on the first day of installation. The meeting should include key personnel from the IT, Manufacturing, and Programming departments and any other personnel needed to support the installation. In some cases, the requirement of all departments may be satisfied by one person. 

    During the Installation

    1. The software will be installed and licensed with a temporary license. Drivers will be configured, and some Windows settings will be changed to better support the Predator DNC system. All network connections will be tested. In some cases, this portion will be started prior to the onsite visit. 
    2. Hardware will be installed on CNC machines. These CNC machines must be fully accessible to the technician and any delays may require additional onsite time to complete the project. An average of 60 minutes per machine is needed but can increase due to the complexity of the CNC machine and scope.
    3. Basic training will be conducted with CNC machine operators and supervisory personnel. 
    4. Administrator training will be conducted with IT staff and project lead.


    1. At the end of the installation, a Service Report will be provided and must be signed off by the project lead. This will include a complete overview of the service performed, including software installation, hardware installation, both user/administrator training details, list any open issues, and recommendations. 
    2. A signed copy of this Service Report shall be returned to the technician as soon as possible.

      • Related Articles

      • Predator DNC Remote Installation Preparation

        Overview To help prepare for your remote Predator DNC installation, it is recommended you read the following Knowledge Base. Feel free to ask a SFA technician any questions. Licensing Preparation The Predator DNC application will use a temporary ...
      • Predator DNC Adding Machine Preparation

        Overview To help prepare to add a machine to Predator DNC, it is recommended you read the following Knowledge Base. Feel free to ask a SFA technician any questions. Software to Download TeamViewer Requirements Predator DNC Computer with Internet ...
      • How to Back Up the Predator DNC PXP Configuration

        Overview Backing up the Predator DNC configuration is key to preventing shop downtime. The Predator DNC configuration is known as the PXP. To back up the the PXP, use the following as a general guideline to find it and save to a secure location. Shop ...
      • How to Migrate Predator DNC

        Overview The following will provide instruction to migrate Predator DNC v11 to a new PC. Requirements Local Administrator Rights Predator DNC v11 installed on new PC (How to Install Predator DNC v11) PXP Configuration File (How to Back Up the ...
      • How to Restart the Predator DNC Service

        Overview For headless Predator DNC system, the software will run as a Windows service. This article will review how to restart the service as needed. Requirements Access to Predator DNC Computer Permissions to access Services.MSC (typically local ...