🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide to Configuring Network Segmentation to Monitor and Protect Communications for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.X

Practical, step‑by‑step guidance for small contractors to implement network segmentation, monitoring, and protections that support FAR 52.204-21 and CMMC 2.0 Level 1 communications controls.

April 14, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide gives small contractors and IT teams a practical, repeatable approach to design, implement, monitor, and document network segmentation that helps meet the intent of FAR 52.204-21 (safeguarding Federal Contract Information) and CMMC 2.0 Level 1 system/communications protection expectations (SC.L1-B.1.X), focusing on controlling, monitoring, and protecting communications that carry controlled information.

Why segmentation matters for FAR 52.204-21 and CMMC 2.0 Level 1

FAR 52.204-21 requires basic safeguarding of Federal Contract Information (FCI) — that means limiting where FCI resides and who or what can access it. CMMC Level 1 emphasizes basic cyber hygiene and protecting system communications. Network segmentation reduces the attack surface by isolating systems that handle FCI from general-purpose user devices, enables more focused monitoring of sensitive flows, and makes enforcement of least-privilege network access practical for small environments.

Step-by-step implementation

1) Inventory and classify assets and communications

Start by identifying all systems, services, and data flows that handle FCI. Create a simple spreadsheet with hostname, IP, VLAN/subnet, owner, role (e.g., file server, mail, workstation), and sensitivity (FCI / Non-FCI). Map communications: which users, applications and ports need access to the FCI systems. This asset-and-flow inventory is the foundation for segmentation and evidence for compliance reviewers.

2) Design a segmentation scheme (practical example)

Design segments as separate VLANs/subnets: for example, VLAN 10 (Employees 192.168.10.0/24), VLAN 20 (FCI Servers 192.168.20.0/24), VLAN 30 (Guest/IoT 192.168.30.0/24), and VLAN 99 (Management 192.168.99.0/24). Use a default-deny approach between segments and only allow specific flows. Example Cisco SVI + ACL approach (illustrative):

interface Vlan10
ip address 192.168.10.1 255.255.255.0
!
interface Vlan20
ip address 192.168.20.1 255.255.255.0

ip access-list extended EMP_TO_SERVERS
permit tcp 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255 eq 443
permit tcp 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255 eq 80
deny ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
permit ip any any

Apply the ACL inbound on the employee SVI or at the firewall controlling inter-VLAN routing. For small orgs using pfSense or a UTM, create firewall rules that explicitly allow required ports from the employee subnet to the FCI subnet and place a blocking rule for all other inter-subnet traffic.

3) Enforce and monitor communications

Enforcement: place segmentation enforcement at layer 3 (router/firewall) and, where possible, at layer 2 (switch port VLAN assignment and port-security). Protect management interfaces: only permit access to the management VLAN from a hardened jump host and enable multifactor authentication where available. Monitoring: enable NetFlow/IPFIX on routers and firewalls and forward flows to a lightweight collector such as ntopng or a small SIEM (Elastic/OSS alternatives). Example NetFlow config (Cisco):

ip flow-export destination 10.0.0.50 2055
ip flow-export version 9
ip flow-cache timeout active 1

Forward firewall and system syslogs to a centralized log host (rsyslog/Graylog/ELK). Deploy a network IDS/IPS (Suricata/Zeek) in tap or mirror mode to inspect east-west traffic for data exfiltration patterns; configure alerts for large or unusual flows from FCI subnets. For remote access, require company VPN with strong encryption (TLS 1.2/1.3), endpoint checks, and MFA; deny split tunneling unless you can enforce routing rules to protect FCI.

4) Test, validate, and document

Validate segmentation with active tests: from an employee workstation attempt to access non-permitted ports on FCI servers (use nmap/Netcat) and confirm blocks; run workflows that must work (web access to web server) to ensure rules aren’t over-restrictive. Capture screenshots, firewall logs, and flow reports as evidence. Maintain configuration backups, an architecture diagram showing VLANs/subnets and allowed flows, and a change log for any rule updates. These artifacts support FAR and CMMC reviewers and accelerate remediation should an audit occur.

Real-world example for a small business

Example: a 25-person subcontractor stores FCI on an on-prem file server and uses cloud email. They implement VLAN 20 for the file server, move all workstations to VLAN 10, and place IoT devices on VLAN 30. Firewall rules permit only HTTPS from VLAN 10 to an application server in VLAN 20 and RDP/SSH is explicitly restricted to a small list of admin IPs. NetFlow is exported to a low-cost VM running ntopng, and firewall logs are shipped to a lightweight ELK stack. After deployment they run a simple weekly validation script that attempts blocked connections and emails the SOC owner if any previously barred ports are reachable.

Risks of not implementing segmentation and compliance tips

Without segmentation you increase the likelihood of lateral movement after a user device compromise, making it easy for attackers to reach FCI. This can lead to data exfiltration, contract violations, reputational damage, and the potential loss of government contracts. Compliance tips: keep rule sets small and well-documented, rotate and store configs securely, implement least privilege for network access, include segmentation diagrams in compliance artifacts, and schedule regular reviews (quarterly) of flow logs and firewall rules.

Summary: network segmentation, combined with focused monitoring and documented testing, is a practical and cost-effective way for small contractors to protect communications that carry FCI and to meet the intent of FAR 52.204-21 and CMMC 2.0 Level 1 communications controls (SC.L1-B.1.X). Start with inventory and classification, design restrictive VLAN/subnet boundaries, enforce with firewall and switch controls, instrument your network with flow and log collection, test regularly, and keep evidence and diagrams current for compliance reviewers.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes