{
  "title": "How to Configure VLANs and Firewalls to Separate Public and Internal Networks — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.XI: Practical Deployment Steps",
  "date": "2026-04-03",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-configure-vlans-and-firewalls-to-separate-public-and-internal-networks-far-52204-21-cmmc-20-level-1-control-scl1-b1xi-practical-deployment-steps.jpg",
  "content": {
    "full_html": "<p>This post gives practical, actionable steps to design and deploy VLANs and firewall policies that separate public (DMZ) and internal networks to meet the intent of FAR 52.204-21 and CMMC 2.0 Level 1 control SC.L1-B.1.XI, with small-business examples, sample configurations, and compliance tips you can implement this week.</p>\n\n<h2>How this maps to FAR 52.204-21 and CMMC 2.0 Level 1</h2>\n<p>Both FAR 52.204-21 and CMMC Level 1 SC.L1-B.1.XI require protecting the boundary between publicly accessible systems and internal systems that process Controlled Unclassified Information (CUI) or business-sensitive data. Practically, that means: (1) segment services that must be reachable from the Internet into a DMZ/public VLAN, (2) enforce least-privilege east-west and north-south traffic with stateful firewall rules and ACLs, and (3) log and control administrative access. Implementing VLANs + a default-deny firewall posture demonstrates technical controls auditors expect for network separation.</p>\n\n<h2>Network design: VLANs and zones (practical guidance)</h2>\n<p>Start with a simple zone design: Management, Internal (trusted), DMZ/Public (untrusted-facing), and Guest (if needed). Assign distinct VLAN IDs and non-overlapping RFC1918 subnets to each VLAN. Example scheme for a small business: VLAN 10 - MANAGEMENT - 10.0.10.0/24; VLAN 20 - INTERNAL - 10.0.20.0/24; VLAN 30 - DMZ - 10.0.30.0/24; VLAN 40 - GUEST - 10.0.40.0/24. Put your Internet-facing servers (web, API gateway, mail gateway) in VLAN 30 and never put administrative consoles for internal systems on the DMZ subnet. Use the management VLAN only for network devices and protect it with ACLs and multifactor authentication (MFA) on management tools.</p>\n\n<h3>Small-business example scenario</h3>\n<p>Imagine a small contractor with an office and one public web server. Place the web server in the DMZ VLAN (VLAN 30, 10.0.30.0/24). The internal file server and user workstations stay in VLAN 20 (10.0.20.0/24). On the perimeter firewall allow inbound TCP/80 and TCP/443 to the DMZ web server only, allow outbound traffic from internal VLAN 20 to the Internet but restrict inbound return traffic to established/related. Use separate DHCP scopes per VLAN and configure DNS so internal hosts resolve internal names differently than public DNS where appropriate.</p>\n\n<h2>Firewall configuration and rule examples</h2>\n<p>Adopt a default-deny (implicit deny) posture for all inter-zone traffic, then add explicit allow rules. Minimum rule set example for a perimeter firewall: 1) Allow inbound TCP/80,443 from ANY to DMZ_SERVER_IP on VLAN 30. 2) Deny inbound traffic from ANY to INTERNAL_SUBNET (10.0.20.0/24). 3) Allow INTERNAL_SUBNET to ANY for outbound Internet with stateful inspection, logging, and egress filtering (by ports/DNS/IPs as necessary). 4) Allow management traffic (SSH/HTTPS) to network devices only from the MANAGEMENT VLAN and a defined admin workstation IP list. 5) Allow DMZ -> INTERNAL only for narrowly scoped service ports (for example, DMZ mail gateway to internal mail relay on TCP 25) and only if required, otherwise block.</p>\n\n<h3>Firewall rule checklist (practical items)</h3>\n<p>Use these implementation points: name each rule clearly; enable logging on allow/deny for critical rules; use application-aware inspection where available; create NAT rules for DMZ hosts rather than putting them directly on the public IP space (source NAT + static port forwards); and enforce HTTPS/TLS for all public services. Keep a \"deny by default\" baseline and permit only what is needed for business operations.</p>\n\n<h2>Example configuration snippets (easy to adapt)</h2>\n<p>Small-business-friendly examples you can adapt: Cisco trunk interface: interface GigabitEthernet0/1. switchport trunk encapsulation dot1q. switchport mode trunk. switchport trunk native vlan 999. switchport trunk allowed vlan 10,20,30,40. On a Cisco router subinterfaces: interface GigabitEthernet0/0.10 encapsulation dot1Q 10 ip address 10.0.10.1 255.255.255.0. pfSense NAT+FW: create VLAN 30 on the LAN interface, assign 10.0.30.1/24, create a firewall rule on WAN to NAT forwarded ports 80/443 to 10.0.30.10 and on the DMZ interface create a rule denying access to 10.0.20.0/24. Ubiquiti/UniFi: create networks for each VLAN with DHCP scopes and apply firewall group rules in the UniFi controller mapping WAN->LAN port forwards and LAN IN rules for inter-VLAN denies.</p>\n\n<h2>Implementation steps, testing, and documentation</h2>\n<p>Step-by-step: 1) Document current network and services (who needs Internet access, which services must be public). 2) Design VLANs/subnets and update IP addressing plan. 3) Configure switch VLANs and trunk ports (start with a lab or maintenance window). 4) Configure the firewall rules and NAT for DMZ services. 5) Move a single public service to the DMZ and validate connectivity and logs. 6) Test access controls: verify you cannot reach internal addresses from the Internet and from the DMZ unless explicitly allowed. 7) Document configs, change approvals, and test results—retain evidence for compliance. Implement monitoring (syslog, firewall logs) and periodically review rules (quarterly minimum).</p>\n\n<h2>Risks, compliance tips and best practices</h2>\n<p>Risk of not implementing: lateral movement from a compromised public host into sensitive internal networks, uncontrolled data exfiltration, failed audits, and potential contract loss. Best practices: use a separate management plane (out-of-band or dedicated management VLAN), enforce multifactor authentication for admin tools, rotate and securely store credentials, apply host hardening on DMZ servers, patch promptly, and keep firewall rule sets minimal and documented. For CMMC/FAR evidence, keep network diagrams, firewall rule lists with change history, and logs showing enforcement and monitoring.</p>\n\n<p>Summary: A simple, well-documented segmentation strategy using VLANs plus a default-deny, stateful firewall between DMZ and internal zones will satisfy the practical intent of FAR 52.204-21 and CMMC 2.0 Level 1 SC.L1-B.1.XI. Implement the design in small, tested steps, enable logging and change control, and maintain documentation and periodic reviews to demonstrate compliance and reduce real-world risk.</p>",
    "plain_text": "This post gives practical, actionable steps to design and deploy VLANs and firewall policies that separate public (DMZ) and internal networks to meet the intent of FAR 52.204-21 and CMMC 2.0 Level 1 control SC.L1-B.1.XI, with small-business examples, sample configurations, and compliance tips you can implement this week.\n\nHow this maps to FAR 52.204-21 and CMMC 2.0 Level 1\nBoth FAR 52.204-21 and CMMC Level 1 SC.L1-B.1.XI require protecting the boundary between publicly accessible systems and internal systems that process Controlled Unclassified Information (CUI) or business-sensitive data. Practically, that means: (1) segment services that must be reachable from the Internet into a DMZ/public VLAN, (2) enforce least-privilege east-west and north-south traffic with stateful firewall rules and ACLs, and (3) log and control administrative access. Implementing VLANs + a default-deny firewall posture demonstrates technical controls auditors expect for network separation.\n\nNetwork design: VLANs and zones (practical guidance)\nStart with a simple zone design: Management, Internal (trusted), DMZ/Public (untrusted-facing), and Guest (if needed). Assign distinct VLAN IDs and non-overlapping RFC1918 subnets to each VLAN. Example scheme for a small business: VLAN 10 - MANAGEMENT - 10.0.10.0/24; VLAN 20 - INTERNAL - 10.0.20.0/24; VLAN 30 - DMZ - 10.0.30.0/24; VLAN 40 - GUEST - 10.0.40.0/24. Put your Internet-facing servers (web, API gateway, mail gateway) in VLAN 30 and never put administrative consoles for internal systems on the DMZ subnet. Use the management VLAN only for network devices and protect it with ACLs and multifactor authentication (MFA) on management tools.\n\nSmall-business example scenario\nImagine a small contractor with an office and one public web server. Place the web server in the DMZ VLAN (VLAN 30, 10.0.30.0/24). The internal file server and user workstations stay in VLAN 20 (10.0.20.0/24). On the perimeter firewall allow inbound TCP/80 and TCP/443 to the DMZ web server only, allow outbound traffic from internal VLAN 20 to the Internet but restrict inbound return traffic to established/related. Use separate DHCP scopes per VLAN and configure DNS so internal hosts resolve internal names differently than public DNS where appropriate.\n\nFirewall configuration and rule examples\nAdopt a default-deny (implicit deny) posture for all inter-zone traffic, then add explicit allow rules. Minimum rule set example for a perimeter firewall: 1) Allow inbound TCP/80,443 from ANY to DMZ_SERVER_IP on VLAN 30. 2) Deny inbound traffic from ANY to INTERNAL_SUBNET (10.0.20.0/24). 3) Allow INTERNAL_SUBNET to ANY for outbound Internet with stateful inspection, logging, and egress filtering (by ports/DNS/IPs as necessary). 4) Allow management traffic (SSH/HTTPS) to network devices only from the MANAGEMENT VLAN and a defined admin workstation IP list. 5) Allow DMZ -> INTERNAL only for narrowly scoped service ports (for example, DMZ mail gateway to internal mail relay on TCP 25) and only if required, otherwise block.\n\nFirewall rule checklist (practical items)\nUse these implementation points: name each rule clearly; enable logging on allow/deny for critical rules; use application-aware inspection where available; create NAT rules for DMZ hosts rather than putting them directly on the public IP space (source NAT + static port forwards); and enforce HTTPS/TLS for all public services. Keep a \"deny by default\" baseline and permit only what is needed for business operations.\n\nExample configuration snippets (easy to adapt)\nSmall-business-friendly examples you can adapt: Cisco trunk interface: interface GigabitEthernet0/1. switchport trunk encapsulation dot1q. switchport mode trunk. switchport trunk native vlan 999. switchport trunk allowed vlan 10,20,30,40. On a Cisco router subinterfaces: interface GigabitEthernet0/0.10 encapsulation dot1Q 10 ip address 10.0.10.1 255.255.255.0. pfSense NAT+FW: create VLAN 30 on the LAN interface, assign 10.0.30.1/24, create a firewall rule on WAN to NAT forwarded ports 80/443 to 10.0.30.10 and on the DMZ interface create a rule denying access to 10.0.20.0/24. Ubiquiti/UniFi: create networks for each VLAN with DHCP scopes and apply firewall group rules in the UniFi controller mapping WAN->LAN port forwards and LAN IN rules for inter-VLAN denies.\n\nImplementation steps, testing, and documentation\nStep-by-step: 1) Document current network and services (who needs Internet access, which services must be public). 2) Design VLANs/subnets and update IP addressing plan. 3) Configure switch VLANs and trunk ports (start with a lab or maintenance window). 4) Configure the firewall rules and NAT for DMZ services. 5) Move a single public service to the DMZ and validate connectivity and logs. 6) Test access controls: verify you cannot reach internal addresses from the Internet and from the DMZ unless explicitly allowed. 7) Document configs, change approvals, and test results—retain evidence for compliance. Implement monitoring (syslog, firewall logs) and periodically review rules (quarterly minimum).\n\nRisks, compliance tips and best practices\nRisk of not implementing: lateral movement from a compromised public host into sensitive internal networks, uncontrolled data exfiltration, failed audits, and potential contract loss. Best practices: use a separate management plane (out-of-band or dedicated management VLAN), enforce multifactor authentication for admin tools, rotate and securely store credentials, apply host hardening on DMZ servers, patch promptly, and keep firewall rule sets minimal and documented. For CMMC/FAR evidence, keep network diagrams, firewall rule lists with change history, and logs showing enforcement and monitoring.\n\nSummary: A simple, well-documented segmentation strategy using VLANs plus a default-deny, stateful firewall between DMZ and internal zones will satisfy the practical intent of FAR 52.204-21 and CMMC 2.0 Level 1 SC.L1-B.1.XI. Implement the design in small, tested steps, enable logging and change control, and maintain documentation and periodic reviews to demonstrate compliance and reduce real-world risk."
  },
  "metadata": {
    "description": "Step-by-step guidance to configure VLANs and firewalls to isolate public/DMZ and internal networks to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 SC.L1-B.1.XI compliance.",
    "permalink": "/how-to-configure-vlans-and-firewalls-to-separate-public-and-internal-networks-far-52204-21-cmmc-20-level-1-control-scl1-b1xi-practical-deployment-steps.json",
    "categories": [],
    "tags": []
  }
}