🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Firewalls and Traffic Filters to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.X: Practical Implementation Steps

Step-by-step, practical guidance for small businesses to configure firewalls and traffic filters to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 (SC.L1-B.1.X) requirements, with sample rules, commands, and audit evidence suggestions.

•
April 20, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives actionable, small-business-focused steps to configure perimeter and host-based firewalls and traffic filters to meet FAR 52.204-21 and CMMC 2.0 Level 1 control SC.L1-B.1.X requirements under the Compliance Framework, emphasizing practical rule examples, testing, and audit evidence you can produce today.

What the control requires (Compliance Framework context)

At a high level SC.L1-B.1.X requires contractors to limit inbound and outbound traffic to authorized sources and services and to apply basic traffic filtering to protect federal information. For the Compliance Framework this maps to: (1) documenting network boundaries and acceptable traffic, (2) implementing access controls at network/host layers (firewalls, security groups, host-based filters), and (3) generating evidence that these controls are configured, logged, and reviewed. The objective is least-privilege network access and demonstrable enforcement.

Step-by-step implementation

1) Inventory, classification and zone design

Begin by documenting the network and assets that process or store covered information. Create a simple network zone map (Internet, DMZ, internal LAN, admin VLAN, remote-access/VPN). Label which hosts/VMs contain Controlled Unclassified Information (CUI) or other sensitive contractor info. Compliance Framework guidance expects you to show scope—capture this in a one-page diagram and a short appendix listing IP ranges, hostnames, and services per zone.

2) Define explicit traffic rules and enforce default-deny

Design rules using a default-deny posture: deny all inbound/egress by default, then permit specific flows. Example minimal inbound rules for a small web service: allow TCP/443 from 0.0.0.0/0 to the web server IP; allow TCP/22 only from the admin IP or over VPN; block all other ports. Example iptables snippet for a Linux perimeter host (simplified): iptables -P INPUT DROP; iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT; iptables -A INPUT -p tcp --dport 443 -j ACCEPT; iptables -A INPUT -p tcp --dport 22 -s 198.51.100.5 -j ACCEPT. For cloud environments, create Security Group rules that mirror this logic and ensure network ACLs are complementary. Practical tip: record the business justification for each allowed rule in a rule table to satisfy change-control audits.

3) Egress filtering and DNS controls

Don't forget outbound traffic—misconfigured or overly permissive egress allows data exfiltration and malware callbacks. Permit outbound to internal DNS/proxy servers and to approved destinations only (e.g., web browsing to 443/80, SaaS endpoints required by business). Example AWS Network ACL rule: deny outbound 53/UDP to the Internet and instead allow only to your internal resolver IP. For small businesses without a proxy, implement host-based DNS filtering and limit outbound SMTP to your mail provider's IP ranges.

4) Secure management access and segmentation

Protect firewall/management interfaces: place them on a dedicated management VLAN, restrict management protocols (use SSH with key-based auth or HTTPS with client certs), and require VPN + MFA for remote admin. Example: on a small office router, disable telnet and use SSH only; restrict SSH to the corporate VPN subnet. Log all administrative sessions and store logs off-box to a centralized collector so auditors can see change timelines.

Practical examples and scenarios for a small business

Scenario A — Small e-commerce shop: Use a cloud load balancer for inbound TLS (TCP/443), host web servers in a private subnet, allow SSH only from the office VPN public IP, and implement an AWS Security Group and Network ACL pair with explicit deny for non-approved ports. Scenario B — Engineering firm with CUI: create a dedicated CUI VLAN, block outbound cloud storage and P2P ports from that VLAN, allow only RDP/SMB traffic through a jump host, and require endpoint host-based firewall rules to only accept RDP from the jump host's IP. Document the mapping between each rule and the Compliance Framework control to produce clear audit evidence.

Logging, evidence and best practices

Logging is critical for FAR/CMMC. Enable firewall logging at INFO level, forward logs to a separate log server or cloud SIEM, and retain logs per your organization policy (commonly 90–365 days depending on contract expectations). Capture screenshots or exports of rule sets, show change requests and approvals, and keep test output (nmap scans showing allowed/blocked ports). Best practices: export a daily/weekly rule snapshot, version-control configuration files, and maintain a simple runbook that describes rule purpose and owner.

Testing, review cadence and change control

Validate rules with active tests and scheduled reviews: run port scans (nmap) from an external host to confirm only allowed services are reachable, test outbound flows with curl/wget from the protected subnet, and perform quarterly rule reviews to remove stale exceptions. Enforce a change-control workflow where any new rule has a business justification, a risk assessment, and rollback steps. For small teams, a lightweight ticketing entry linked to the config export and test results is usually acceptable evidence.

Risks of not implementing the requirement

Failing to implement traffic filtering and proper firewall controls exposes your organization to unauthorized access, lateral movement, ransomware propagation, and data exfiltration—outcomes that can lead to contract loss, regulatory penalties, or mandated remediation. From a Compliance Framework perspective, lack of documented rules, logs, and review evidence will result in findings in an audit and could disqualify your firm from handling federal contracts or CUI-bearing work.

In summary, meeting FAR 52.204-21 / CMMC 2.0 SC.L1-B.1.X for firewalls and traffic filters is achievable for small businesses with disciplined scoping, a default-deny rule model, clear documentation and justification for exceptions, centralized logging, and routine testing and reviews. Start with a simple network diagram and a rule table, implement least-privilege rules in your perimeter and host-based firewalls, collect logs and change evidence, and schedule recurring reviews—those steps will give you both practical protection and the audit trail needed for Compliance Framework validation.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes