🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Firewalls, IDS/IPS and DLP for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.1 Compliance

Step-by-step guidance to configure perimeter and internal firewalls, IDS/IPS sensors, and DLP controls to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 SC.L2-3.13.1 requirements for protecting CUI.

•
April 01, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post translates NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control SC.L2-3.13.1 into actionable, practical steps for configuring firewalls, intrusion detection/prevention systems (IDS/IPS), and data loss prevention (DLP) so you can monitor, control and protect communications at your external and internal boundaries where Controlled Unclassified Information (CUI) resides or transits.

What SC.L2-3.13.1 requires and what to map

SC.L2-3.13.1 requires you to "monitor, control, and protect organizational communications at external boundaries and key internal boundaries." For compliance, map this to: perimeter controls (NGFW/UTM), internal segmentation points (VLANs, internal firewalls), IDS/IPS sensors for detection + prevention, and DLP for exfiltration prevention of CUI. Your evidence should include architecture diagrams, rule sets, IDS/IPS tuning records, DLP policy definitions, logs/alerts, and testing/validation results (vulnerability scans, internal penetration tests, or red-team exercises).

Firewall configuration — concrete steps

Implement a default-deny firewall policy with explicit allow rules for only required services. At a minimum: - Place a stateful NGFW at the external boundary with application awareness (L7) and TLS inspection where feasible. - Use explicit rules such as: allow outbound HTTPS (443) for identified user subnets; deny outbound SMTP from user subnets except via company mail gateways; allow remote access only via company VPNs and only for authorized accounts. - Harden management: restrict management plane access to an administrative management VLAN and to specific admin IPs, require MFA for admin sessions, and use dedicated management interfaces. Example rule order: (1) Allow mgmt IPs -> management port; (2) Allow VPN -> CUI VLAN; (3) Allow web proxy -> Internet ; (4) Implicit deny all other outbound/ingress.

Sample small-business rule set (illustrative)

For a small subcontractor (50 seats, CUI on a file server): implement these basic rules on the perimeter NGFW and internal segmentation firewall: - Permit VPN (IKEv2/IPsec: UDP 500, UDP 4500) to firewall public IP -> VPN pool (limit by cert-based auth). - Permit HTTPS (443) outbound from User VLAN to Internet via corporate Web Proxy (explicit proxy IP). - Allow SMB (445) only between App VLAN and CUI VLAN with logging and deep-packet inspection. - Block peer-to-peer and anonymizing services; block direct SMTP from user VLANs to Internet. - Set implicit deny for everything else and log/reject.

Internal boundaries and segmentation

Key internal boundaries are where CUI is stored, processed, or accessed. Create explicit CUI VLANs/subnets, deploy internal firewalls or internal NGFW zones between user workstations and CUI resources, and enforce least-privilege flows. Use ACLs on switches plus firewall rules to prevent lateral movement: for example, workstation VLAN -> CUI VLAN only via an application proxy or jump host, and restrict server-to-server traffic to required ports and IPs. Implement micro-segmentation for servers hosting CUI if possible (e.g., host-based firewalls, virtual network segments in cloud environments).

IDS/IPS deployment and tuning

Deploy IDS sensors at the external boundary and at key internal boundaries (between user and CUI VLANs). Use IPS inline on perimeter links if you have capacity, but start with IDS in monitoring mode during a baseline period to collect traffic patterns for 30–60 days. Tuning steps: - Baseline traffic and identify business-critical flows to whitelist to reduce false positives. - Configure IPS to block only high-confidence signatures (e.g., confirmed exploit payloads, known botnet C2), and send alerts for medium/low confidence for analyst review. - Keep signature updates automated (daily), and maintain an exception process where operators can mark rules as "monitor only" after analysis. - Use protocol-specific inspection (SSL/TLS, DNS, HTTP) — consider deploying TLS interception on sensors to inspect encrypted traffic where allowed by policy and privacy constraints.

DLP configuration: identify, monitor, enforce

DLP must be configured to detect CUI patterns, content fingerprints, and context (destination, user, process). Practical DLP configuration steps: - Classify and fingerprint canonical copies of CUI (hashes) and import them into the DLP system for accurate matching. - Create detection rules using a combination of pattern matching (e.g., regex for SSN \b\d{3}-\d{2}-\d{4}\b when applicable), file-type detection, keyword lists tied to contract identifiers, and contextual rules (upload to cloud storage, email attachments, removable media). - Apply policies at endpoints (agent-based), network (as a proxy or NGFW integration), and cloud (CASB/DLP integration). Typical actions: Monitor -> Quarantine -> Block (progressive enforcement). - For encrypted channels, enable TLS inspection at the perimeter proxy or use endpoint DLP agents to prevent blind spots. Document exceptions where TLS inspection is not allowed.

Integration, logging, and incident handling

Integrate firewall/IDS/DLP logs into a central SIEM for correlation and long-term retention. Configure alert thresholds to avoid alert fatigue: escalate only correlated multi-signal events (e.g., DLP hit + IDS detection + anomalous outbound connection). Maintain playbooks for common incidents (CUI exfiltration attempt, compromised host) and automate containment where possible (block user account, isolate host via NAC). Recommended logging practices: retain high-fidelity logs for at least 90 days online and archive critical logs per organizational policy for forensic purposes; preserve a copy of logs used in any incident investigations.

Risks of not implementing and compliance best practices

Without properly configured boundaries and DLP, organizations risk exfiltration of CUI, lateral movement after compromise, contract loss, and potential civil or contractual penalties. For small businesses with limited staff, use cloud-managed NGFWs, MDF/IDS managed services, or MSSPs with documented SLAs and SOC support to fill skill gaps. Best practices: maintain documented rule-change processes and baselines, perform periodic rule and signature reviews, run annual penetration tests that include exfiltration scenarios, and keep a POA&M for any residual risk tied to SC.L2-3.13.1.

In summary, meeting SC.L2-3.13.1 requires a layered approach: hardened perimeter and internal firewalls with default-deny rules, strategically placed and tuned IDS/IPS sensors, and robust DLP across endpoint, network and cloud channels. For small businesses, focus on clear segmentation for CUI, use managed or cloud services where appropriate, document everything, and build incident response workflows that tie firewall/IDS/DLP detections to containment and forensic actions—this combination gives you the monitoring, control, and protection evidence auditors will expect under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes