🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure VPN and TLS for Compliance with NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.13 (Implementation Best Practices)

Practical, step-by-step guidance for configuring VPN and TLS to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AC.L2-3.1.13) requirements, with small-business examples and operational tips.

•
March 30, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to configure VPN and TLS to satisfy the intent of NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AC.L2-3.1.13, focusing on practical steps, specific cryptographic settings, and small-business scenarios so you can create defensible, auditable encryption for remote access and data in transit.

Understanding the objective and risk

The objective behind AC.L2-3.1.13 in the Compliance Framework is to ensure confidentiality and integrity of Controlled Unclassified Information (CUI) in transit by using approved cryptographic mechanisms. For a small business, that means all remote access and application traffic that touches CUI must be protected with modern, well-configured VPNs and TLS channels. Failing to implement strong VPN/TLS configurations exposes CUI to eavesdropping, credential theft, session hijacking, lateral movement by attackers, and contractual or regulatory penalties — including loss of DoD contracts.

Choose the right technologies and modes

Pick VPN and TLS technologies that support current standards and can be audited. Recommended combinations: IKEv2/IPsec or WireGuard for network-layer VPNs; OpenVPN (TLS mode) or TLS-based VPN gateways where appropriate; and TLS 1.2 (with strict ciphers) or, preferably, TLS 1.3 for application-layer encryption. For small businesses with limited staff, managed appliances (Cisco Meraki, Palo Alto Prisma Access, Zscaler) or well-maintained open-source stacks (pfSense + StrongSwan for IKEv2/IPsec, or WireGuard) strike a balance between security and operational simplicity.

Concrete cryptographic settings and example configurations

Implement explicit configuration items you can show auditors: disable TLS versions 1.0/1.1 and TLS 1.2 with weak ciphers except where legacy clients require them (document exceptions). Favor TLS 1.3; if TLS 1.2 is needed, allow only AEAD ciphers such as AES256-GCM, AES128-GCM, or CHACHA20-POLY1305 and require ECDHE key exchange. Minimum key lengths: RSA ≥ 2048 bits (prefer 3072), ECC P-256 (or higher), and use SHA-256/SHA-384 for signatures. Example for a TLS stack (nginx/haproxy): set TLSv1.2 and TLSv1.3 supported, specify cipher suites to exclude CBC and RC4, enable ECDHE, and enable OCSP stapling and HSTS. For IPsec/IKEv2 use AES-GCM (256), prf = SHA-256, and ECP groups (group 19/20/21) for ECDH; ensure PFS (Perfect Forward Secrecy) is enabled.

Small-business sample: pfSense + StrongSwan (IKEv2) checklist

On pfSense/StrongSwan: enable IKEv2, choose ECDH groups (curve 521 optional but group 21/20 sufficient), set encryption to AES-GCM-256, authentication to SHA-256, set lifetime 8–12 hours, require certificate-based or EAP+MFA authentication (see MFA below), disable split-tunneling for CUI systems, and enable traffic logging to a central syslog collector for retention and audit. Keep the appliance firmware patched and export signed configuration snapshots as evidence for auditors.

Authentication, MFA, and endpoint posture

CUI demands strong authentication in addition to encrypted channels. Require multi-factor authentication (MFA) for VPN logins: certificate + password or certificate + OTP is preferred. Do not rely on password-only VPN. Integrate with your identity provider (Azure AD, Okta, or RADIUS with MFA) so you can produce authentication logs. Implement endpoint posture checks (antivirus, disk encryption, OS patch level) and block non-compliant endpoints from accessing CUI networks. For small firms, a cloud-managed VPN + SSO/MFA solution reduces management overhead while producing centralized logs for compliance evidence.

Operational controls, key management, and auditing

Maintain an inventory of all TLS certificates and VPN keys, with expiration dates and owner contacts; automate renewal where safe (ACME/Let’s Encrypt OK for public facing services, but for internal access to CUI prefer enterprise PKI or short-lived certs provisioned via your IDP). Rotate keys and certificates at least annually or upon personnel changes; revoke compromised certs immediately and demonstrate CRL/OCSP handling. Log VPN session metadata (username, source IP, start/stop times, bytes transferred) and retain logs per your organization’s retention policy for audits — commonly 1 year for CUI-related records. Document configuration baselines and change control procedures to show consistent secure posture.

Practical small-business scenarios and trade-offs

Scenario 1: A 25-person subcontractor uses remote developers and needs to protect CUI. Implement a cloud-managed IKEv2 VPN appliance with SSO + MFA, enforce full-tunnel (no split-tunnel), require disk encryption on developer laptops, and centralize logging to a small SIEM (or cloud log archive). Scenario 2: A low-budget shop wants open-source: deploy pfSense edge with WireGuard for remote access, authenticate with certificates provisioned from an internal CA and 2FA via a RADIUS server. Document the rationale for WireGuard (modern crypto, small codebase) and add compensating control documentation (frequent key rotation, strict interface rules) to satisfy auditors.

Compliance tips and best practices

Create an evidence package: architecture diagrams, configuration snippets (sanitized), certificate inventory, MFA logs, change-control tickets, and vulnerability scan/pen-test reports. Disable split tunneling for CUI by default; if you must enable it for performance, document compensating controls such as endpoint DLP and strict ACLs. Ensure firmware/software updates for VPN appliances are performed on a regular cadence and tie those updates into your configuration management and revision history. Finally, run periodic transport-layer and VPN handshake tests (sslscan, testssl.sh, Nessus) to detect weak ciphers or accidental regressions.

In summary, meeting AC.L2-3.1.13 for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requires a combination of modern cryptographic choices (TLS 1.3 or strong TLS 1.2, ECDHE/PFS, AES-GCM/ChaCha20), robust authentication (MFA and certificates), operational key management, and logging/monitoring. For small businesses, prioritize managed solutions or well-documented open-source stacks, disable split-tunnel for CUI, automate certificate/patch workflows where possible, and maintain auditable evidence to demonstrate compliance. Following these practices reduces risk to CUI and produces the configuration and operational artifacts auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes