AgentGateway

Open-source Rust-based data plane for agentic AI connectivity. Serves as the network-layer control plane for both A2A (Agent-to-Agent) and MCP (Model Context Protocol) traffic.

Architecture

  • Language: Rust (performance-oriented; suits inline traffic interception)
  • Protocols: A2A Protocol and MCP Protocol — the two primary inter-agent and agent-to-tool communication protocols as of 2026
  • Policy model: RBAC (Role-Based Access Control) with multi-tenant support
  • Configuration: dynamic via xDS (the Envoy/Istio configuration API — familiar to service-mesh operators)

Role in the Security Stack

AgentGateway sits in the network/protocol layer of the Security Controls for AI Stacks taxonomy. It provides:

  • Centralized control over which agents can communicate with which tools/servers
  • Protocol-aware policy enforcement (not generic TCP/HTTP filtering)
  • Multi-tenant isolation — different teams / agent deployments can share infrastructure with policy-enforced separation

Relationship to Other Controls

  • Complements LlamaFirewall (model-layer detection) — AgentGateway enforces access policy; LlamaFirewall detects adversarial inputs.
  • Integrates with MCP Security controls — AgentGateway as MCP broker provides a natural policy enforcement point for MCP tool access.
  • The Okta Agent Gateway (enterprise) provides similar centralized control with Okta identity integration; AgentGateway is the open-source analog.

See Also