There are a number of scenarios available which are outlined below. Users should start at the beginning which will take you through initial setup of the FMC, device registration, zone and interface setup, routing and NAT policies. You can then proceed to configuring threat protection such as Discovery policy, Intrusion policy using Snort 3, Malware & File policy, Security Intelligence, Decryption policy and finally Access Control rules and advanced settings.
To accomplish these labs, we will use the dCloud lab environment. There are a number of VMs deployed including Firewall Management Center (FMC), FTD devices, as well as Windows Domain Controllers and other Windows and Linux hosts.