🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Firewalls, VPNs, and Policies to Control External Connections — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III

Practical step-by-step guidance for small businesses to configure firewalls, VPNs, and access policies to control external connections and meet FAR 52.204-21 / CMMC 2.0 Level 1 AC.L1-B.1.III requirements.

April 13, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Controlling external connections is a core requirement under FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.III): you must ensure only authorized remote access and external traffic reach systems that process or store government-related information — and do so in a way that is auditable, repeatable, and defensible for small business environments.

Why control of external connections matters for the Compliance Framework

External connections are the primary vector for data exfiltration and initial access by attackers. For organizations subject to FAR 52.204-21 and CMMC 2.0 Level 1, the goal is simple: minimize and tightly control inbound and outbound network paths so only approved users, services, and destinations can connect. Meeting AC.L1-B.1.III requires technical controls (firewalls, VPNs, host firewalls) plus policies and logging that prove controls were implemented and monitored.

Practical firewall configuration steps (perimeter and host)

Start with a "deny by default" posture on the perimeter firewall: block all inbound traffic and only create specific permit rules for required services. Example baseline rules: allow outbound HTTP/HTTPS from internal subnets to the internet, allow inbound TCP/443 only to a DMZ web server IP, and permit administrative VPN termination from specific vendor or employee IP ranges. Concrete rule examples you can map to most appliances: permit TCP 443 to 198.51.100.25/32 (web server); deny all other inbound; allow outbound to 0.0.0.0/0 only from 10.0.0.0/24 but restrict DNS to internal DNS forwarders.

Firewall examples and technical details

On a small Linux edge router you might use iptables or nftables. Example iptables snippets (illustrative): iptables -P INPUT DROP, iptables -A INPUT -p tcp -s 203.0.113.5 --dport 1194 -j ACCEPT (allow VPN from a known vendor IP), and iptables -A FORWARD -s 10.0.0.0/24 -p tcp --dport 443 -d 198.51.100.25 -j ACCEPT (allow internal user access to a specific service). On enterprise appliances use zone-based rules (trust, untrust, dmz) and application-level inspection to block protocols that tunnel other traffic (e.g., unauthorized VPNs or P2P). Maintain an allow-list of IPs and networks for inbound admin access (e.g., SSH/RDP) and avoid internet-exposed management interfaces entirely — require access via an internal jump host over an approved VPN.

Perimeter vs host-based controls

Perimeter firewalls reduce exposure, but host-based firewalls are your last line of defense. Configure Windows Defender Firewall or ufw/nftables on servers and workstations to enforce the same least-privilege rules as the perimeter. For example, block inbound RDP on all hosts and only allow RDP from the administrative subnet or via the VPN IP range. Document host firewall rules and collect configuration snapshots as compliance evidence.

VPN configuration guidance — secure remote access and key settings

For remote access, use a modern, auditable VPN solution. Prefer IKEv2/IPsec or OpenVPN (TLS mode) running strong cryptography: AES-256-GCM, SHA-2 HMAC, and DH groups with at least 2048-bit strength (or corresponding ECC groups). Use certificate-based authentication for user and device identities rather than static pre-shared keys. Disable split-tunneling if the remote worker will access CUI — forcing full-tunnel VPN ensures traffic is inspected by corporate controls. Example OpenVPN settings: TLS 1.2+, tls-auth/tls-crypt HMAC, and server-side client-config directives to bind clients to specific internal IPs or VLANs.

Policies, logging, and evidence collection for Compliance Framework

Technical configuration is only half the requirement: create and maintain access control and remote access policies that define approved connection types, who can request exceptions, and review cadence. Log VPN authentication events, connection times, source IPs, and firewall accept/deny logs; export logs to a central syslog or SIEM and retain them per your contract requirements (90 days is a common minimum). For audit evidence, collect: firewall rule snapshots, VPN configuration backups, user access lists, change-control tickets for rule changes, and periodic access review records.

Small business scenarios and real-world examples

Example 1 — Small accounting firm: remote accountants need access to a hosted QuickBooks server. Implement a VPN (certificate-based) with full tunnel, restrict access on the firewall to only the accounting server IP and required ports (e.g., TCP 443 for web access), and require MFA on VPN logins. Keep a spreadsheet (or ticketing evidence) mapping each user to a certificate and retain VPN logs to show who connected when. Example 2 — Engineering subcontractor: provide a vendor SFTP drop. Configure a DMZ SFTP box, restrict inbound SFTP to the vendor's static IP addresses, enforce SFTP (not FTP), and log transfer events; document the contractual rationale and revoke vendor access when the work ends.

Risk of non-implementation and best practices

If you fail to control external connections you increase the risk of unauthorized access, ransomware, CUI exposure, and contract loss. Noncompliance with FAR/CMMC can lead to contract sanctions and reputational harm. Best practices: maintain least privilege, implement defense in depth (perimeter + host + VPN), use allow-lists for inbound access, require certificate-based VPNs and MFA, disable split-tunneling for CUI, review rules quarterly, and automate configuration backups and logging.

In summary, meeting AC.L1-B.1.III under FAR 52.204-21 / CMMC 2.0 Level 1 is practical for small businesses if you adopt a default-deny firewall posture, use strong, certificate-based VPNs with appropriate tunnel settings, document policies and access approvals, and retain logs and configuration snapshots as evidence. Implement these steps, run periodic reviews, and you will have a defensible, auditable control set that minimizes external connection risk while remaining operationally practical.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes