🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Firewalls, VPNs, and TLS to Comply with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.X

Practical, small-business focused steps to configure firewalls, VPNs, and TLS to meet FAR 52.204-21 and CMMC 2.0 Level 1 networking and transport protections.

•
April 05, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives practical, step-by-step guidance for configuring firewalls, VPNs, and TLS to meet the basic safeguarding requirements of FAR 52.204-21 and CMMC 2.0 Level 1 (SC.L1-B.1.X), including concrete examples a small business can implement and evidence they should collect for assessments.

Understand the Requirement and Your Risk Profile

FAR 52.204-21 and CMMC Level 1 require "basic safeguarding" of Federal Contract Information (FCI); SC.L1-B.1.X maps to protecting the confidentiality and integrity of information in transit and limiting network exposure. Start by classifying where FCI and related systems live (on-prem, cloud, employee devices) and identify network boundaries where traffic crosses trust zones. For small businesses this usually means: office LAN to Internet, employee remote access, and cloud-hosted contractor systems.

Firewall Configuration: Principles and Concrete Rules

Implement a "default-deny" policy on every firewall (edge, host-based, and cloud security group). Practically: block all inbound connections by default; permit only specific source/destination/port combinations. Example rule set for a small office web service: allow inbound TCP 443 to the webserver's IP from 0.0.0.0/0, allow inbound TCP 22 only from a fixed admin public IP or jump host, and allow outbound DNS (UDP/TCP 53) and HTTPS (TCP 443) from internal subnets. On Linux servers use ufw/pf/iptables; e.g., UFW: sudo ufw default deny incoming; sudo ufw allow proto tcp from 203.0.113.5 to any port 22; sudo ufw allow 443/tcp. In AWS use Security Groups + NACLs: only open 443/443 and restrict 22 to management IPs. Maintain a firewall rule inventory and a change log as evidence.

Logging, Alerts, and Retention

Enable stateful logging on firewalls and forward logs to a central location (SIEM, cloud log service, or a secured syslog server). For small businesses use a managed logging service or a low-cost VM running Elastic/Graylog and retain logs for at least 90 days (adjust per contract). Configure alerts for repeated blocked attempts, unusual outbound connections, or port scans. Evidence: firewall rule export, log retention policy, and recent logs showing normal traffic and blocked events.

VPNs: Secure Remote Access and Site Connectivity

Use a VPN to protect remote access to internal resources and to avoid exposing management ports to the internet. For CMMC Level 1, a practical choice is either a modern TLS-based VPN (OpenVPN) or WireGuard. Configure authentication with strong user credentials and, where possible, certificate-based authentication rather than only username/password. Example WireGuard basics: use Curve25519 keys, unique keypairs per user, keep ListenPort on the server and only open that port in the firewall to known peers, and restrict AllowedIPs to internal subnets to prevent lateral tunneling. For OpenVPN, use tls-auth/tls-crypt, use AES-256-GCM or use TLS 1.3 with modern ciphers, and disable deprecated options like static keys or TLS 1.0.

Operational Controls for VPNs

Limit VPN account lifetimes and require unique accounts (no shared credentials). Maintain a roster of authorized VPN users and last-login evidence. Disable split tunneling unless absolutely needed; if used, document why and monitor outbound flows. For small businesses using cloud-managed VPN appliances (e.g., AWS Client VPN, Azure VPN Gateway, or vendor appliances like Cisco Meraki), leverage their built-in logging and MFA integration (where available) to strengthen access. Evidence: VPN user list, connection logs, client configuration baseline, and access approvals.

TLS Configuration: Protocols, Ciphers, and Certificate Management

TLS must be configured to use modern versions and ciphers. Require TLS 1.2 minimum and prefer TLS 1.3 where supported. Disable SSLv3/TLSv1.0/TLSv1.1. Example nginx snippet (practical): ssl_protocols TLSv1.2 TLSv1.3; ssl_prefer_server_ciphers on; ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384'; ssl_session_cache shared:SSL:10m; ssl_session_tickets off; ssl_stapling on; resolver 1.1.1.1 1.0.0.1 valid=300s; resolver_timeout 5s. Use automated certificate issuance/renewal (ACME/Let's Encrypt or an enterprise PKI) and maintain a certificate inventory with expiration dates to avoid service outages.

Hardening TLS and Practical Tests

Disable weak key exchange (RSA key-exchange), enable forward secrecy (ECDHE), and prefer AEAD ciphers (GCM/ChaCha20-Poly1305). For web services enable HSTS, set secure cookies, and validate with scanners such as Qualys SSL Labs or Mozilla Observatory. Keep server libraries up to date (OpenSSL, NSS). Evidence for assessors: TLS configuration files, SSL/TLS scan reports showing A or A+ grades, cert inventory, and renewal automation logs.

Real-World Small Business Scenarios

Scenario A: Small subcontractor hosting FCI in AWS. Implement Security Groups with least-privilege rules, put management hosts in a bastion host subnet restricted by source IP, require SSM or managed jump hosts instead of opening SSH. Use AWS Client VPN or site-to-site IPsec with strong ciphers. Use Application Load Balancer terminating TLS (TLS 1.2/1.3) with ACM certificates and CloudWatch logs for access analysis.

Scenario B: On-premises office with mixed devices. Use a UTM/firewall (pfSense, Sophos, or SonicWall) configured with default deny, VPN for remote staff (WireGuard/OpenVPN), and a small log server (or cloud logging). Use a documented change control process: ticket for firewall change, reviewer sign-off, and export of rule diffs for compliance evidence.

Risks of Non-Compliance and Practical Mitigations

Failing to implement these controls increases the risk of FCI exposure, contractor breach notifications, contract termination, and loss of reputation. Technically, risks include credential theft via unencrypted channels, lateral movement after exposed management ports, and man-in-the-middle attacks due to weak TLS. Mitigations: enforce baseline configurations, schedule quarterly reviews, use automated scans, and retain artifacts (rule lists, logs, scan reports) for audits. Short-term compensating controls (if immediate remediation isn't possible) include network segmentation and additional monitoring.

Summary: For CMMC 2.0 Level 1 / FAR 52.204-21 compliance, implement default-deny firewalls with documented rule sets and logging, deploy VPNs with certificate-backed authentication and limited scope, and configure TLS to use modern protocols and ciphers with automated certificate management; collect and retain configuration exports, access logs, and scan reports as evidence. These practical steps, when combined with policies and periodic reviews, provide the defensible posture small businesses need to pass assessments and reduce the risk of FCI exposure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes