Skip to main content
Redhat Developers  Logo
  • AI

    Get started with AI

    • Red Hat AI
      Accelerate the development and deployment of enterprise AI solutions.
    • AI learning hub
      Explore learning materials and tools, organized by task.
    • AI interactive demos
      Click through scenarios with Red Hat AI, including training LLMs and more.
    • AI/ML learning paths
      Expand your OpenShift AI knowledge using these learning resources.
    • AI quickstarts
      Focused AI use cases designed for fast deployment on Red Hat AI platforms.
    • No-cost AI training
      Foundational Red Hat AI training.

    Featured resources

    • OpenShift AI learning
    • Open source AI for developers
    • AI product application development
    • Open source-powered AI/ML for hybrid cloud
    • AI and Node.js cheat sheet

    Red Hat AI Factory with NVIDIA

    • Red Hat AI Factory with NVIDIA is a co-engineered, enterprise-grade AI solution for building, deploying, and managing AI at scale across hybrid cloud environments.
    • Explore the solution
  • Learn

    Self-guided

    • Documentation
      Find answers, get step-by-step guidance, and learn how to use Red Hat products.
    • Learning paths
      Explore curated walkthroughs for common development tasks.
    • Guided learning
      Receive custom learning paths powered by our AI assistant.
    • See all learning

    Hands-on

    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.
    • Interactive labs
      Learn by doing in these hands-on, browser-based experiences.
    • Interactive demos
      Click through product features in these guided tours.

    Browse by topic

    • AI/ML
    • Automation
    • Java
    • Kubernetes
    • Linux
    • See all topics

    Training & certifications

    • Courses and exams
    • Certifications
    • Skills assessments
    • Red Hat Academy
    • Learning subscription
    • Explore training
  • Build

    Get started

    • Red Hat build of Podman Desktop
      A downloadable, local development hub to experiment with our products and builds.
    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.

    Download products

    • Access product downloads to start building and testing right away.
    • Red Hat Enterprise Linux
    • Red Hat AI
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat Developer Toolset

    References

    • E-books
    • Documentation
    • Cheat sheets
    • Architecture center
  • Community

    Get involved

    • Events
    • Live AI events
    • Red Hat Summit
    • Red Hat Accelerators
    • Community discussions

    Follow along

    • Articles & blogs
    • Developer newsletter
    • Videos
    • Github

    Get help

    • Customer service
    • Customer support
    • Regional contacts
    • Find a partner

    Join the Red Hat Developer program

    • Download Red Hat products and project builds, access support documentation, learning content, and more.
    • Explore the benefits

Enable Firewall-as-a-Service in OpenStack Services on OpenShift

April 9, 2026
Gurpreet Singh Slawomir Kaplonski
Related topics:
KubernetesSecuritySecure codingVirtualization
Related products:
Red Hat OpenShiftRed Hat OpenShift Virtualization

    As more OpenStack-based clouds are adopted for multi-tenant applications, security remains a top priority. Network-level isolation and traffic control is critical in public or hybrid cloud environments. Red Hat OpenStack Services on OpenShift delivers an OpenStack cloud computing platform that runs as a virtual machine (VM) within Red Hat OpenShift Virtualization. This provides cloud-based advantages (e.g., enhanced scalability, faster deployment, and easier management) for new and traditional virtualized applications. This new architecture replaces the Red Hat OpenStack Platform control plane with a native, pod-based control plane running directly in Red Hat OpenShift. In this article, we will discuss Firewall-as-a-Service (FWaaS), its use cases, benefits, and how to enable and configure it. 

    What is FWaaS in OpenStack?

    Although security groups provide sufficient capability to specify the security policy at a VM instance level or VM port level, it does not have support to specify policy at a network or router port level. Additionally, scenarios where it is required to explicitly deny specific traffic, security policies implemented using security groups only fall short.  

    The FWaaS project provides this additional capability to specify the security policies at the router port level and enables specifying multiple policy rules within the same policy group and also supports application of L3 policy at the router port level. FWaaS also provides support for NGFW third party plug-ins for integration with NGFW vendor solutions enabling firewall capabilities beyond the ACL level, and features and capabilities such as DPI, malware protection, IPS and IDP.

    FWaaS (service plug-in for neutron) enables tenants and administrators to create firewall policies that apply to traffic passing through Neutron routers (Figure 1). It supports:

    • Stateful layer 3/4 firewall rules
    • Rules per tenant/project
    • Policies assigned to routers

    FWaaS v2 is the current supported version in most modern OpenStack deployments.

    A diagram showing firewall-as-a-service, FWaaS enabling network security policies.
    Figure 1: FWaaS enables network security policies.

    Key use cases

    FWaaS enables several key security capabilities, including multi-tenant isolation to allow tenants to define and control traffic to and from their networks, microsegmentation for defining fine-grained rules for internal workloads, and East-West traffic control to prevent lateral movement across internal segments. Additionally, it offers Ingress/Egress restrictions to limit access to specific external services.

    How FWaaS works

    FWaaS is implemented as a Neutron service plug-in. It utilizes OVN port groups and ACLs and applies them to the logical router ports created in Neutron. Each tenant can:

    • Define firewall rules
    • Group them into firewall policies
    • Define firewall group with ingress and/or egress policies
    • Attach the policy to a router

    Enable FWaaS v2 in OpenStack

    Prerequisite: OpenStack Services on OpenShift 18 FR4 or later

    Neutron-fwaas service plug-in is already included in the openstack-neutron-server container image. The only thing which needs to be done is enable it in the neutron configuration. That can be done through the customServiceConfig parameter in the OpenStackControlPlane CR.

    $ oc -n openstack patch openstackcontrolplane openstack-galera-network-isolation --type=merge -p "
    
    spec:
    
        neutron:
    
            template:
    
                customServiceConfig: |
    
                  [DEFAULT]
    
                  service_plugins = qos,ovn-router,trunk,segments,port_forwarding,log,firewall_v2
    
                  [service_providers]
    
                  service_provider = FIREWALL_V2:fwaas_db:neutron_fwaas.services.firewall.service_drivers.ovn.firewall_l3_driver.OVNFwaasDriver:default
    
    "

    Verify enabled service plug-in

    To verify if neutron-fwaas is available in the environment, just check if the fwaas_v2 Neutron API extension is available.

    openstack extension list --network | grep fwaas_v2

    Create a firewall for a tenant

    Assume a project named "demo" with a router demo-router connecting a private and external network.

    Create the firewall rules.

    openstack firewall group rule create \
      --protocol tcp --source-port 22 --destination-port 22 \
      --action allow --enabled --description "Allow SSH" 
    openstack firewall group rule create \
      --protocol icmp --action allow \
      --enabled --description "Allow ping" \
      --project demo

    Create a firewall policy and add rules.

    openstack firewall group policy create demo-fw-policy --project demo
    
    openstack firewall group policy rule add demo-fw-policy <rule-ssh-id>
    openstack firewall group policy rule add demo-fw-policy <rule-ping-id>

    Create a firewall group and apply to router ports.

    openstack firewall group create demo-fw-group \
      --ingress-firewall-policy demo-fw-policy \
      --egress-firewall-policy demo-fw-policy \
      --port <router-port-id>

    Get the router’s internal port ID.

    openstack port list --router demo-router

    FWaaS benefits & best practices

    FWaaS offers several key benefits, including tenant control, allowing tenants to define their own traffic rules without needing admin intervention, and consistent policy enforcement across multiple routers and projects. It also provides granular control, down to protocol, port, and IP ranges, with the ability to specify the order of firewall rule application. Finally, it aids in compliance by helping to enforce internal segmentation for audits.

    When deploying FWaaS within a OpenStack Services on OpenShift environment, adhering to established best practices ensures both optimal performance and a robust security posture. Foremost, organizations should exclusively standardize on FWaaS v2 because it offers a more granular and flexible object model, specifically the ability to apply firewall groups to multiple ports essential for the distributed nature of ML2/OVN-based deployments. To maintain a zero trust architecture, administrators must regularly audit firewall policies to enforce least-privilege access, ensuring that only strictly necessary traffic is permitted across project boundaries.

    For a truly resilient defense-in-depth strategy, it is critical to combine FWaaS with security groups. While FWaaS operates at the perimeter of the project (the router level), security groups provide a stateful, port-level firewall directly at the VM instance, creating a layered defense that protects against both external threats and internal lateral movement. Finally, to ensure operational visibility, you should enable comprehensive logging for forensic analysis and real-time monitoring. By centralizing these logs within the OpenStack Services on OpenShift observability stack, teams can effectively track packet flow events and identify potential security breaches before they escalate.

    Best Practice

    Technical Context & Implementation

    Use FWaaS v2

    Leverages the OVN mechanism driver to manage logical routers and ports more effectively than the deprecated v1.

    Least-Privilege Audits

    Utilizes RBAC policies to ensure only authorized projects can modify or attach to specific networking resources.

    Layered Defense

    Uses FWaaS for North-South perimeter control and ML2/OVN security groups (stateful or stateless) for East-West micro-segmentation.

    Forensic Logging

    Aggregates acl_log data in ovn-controller.log on compute nodes to monitor accepted or dropped sessions for security audits.

    Note: Due to a known issue where combining stateful security groups (SGs) with Firewall-as-a-Service (FWaaS) does not function as expected, we recommend using stateless SGs when implementing FWaaS.

    Final thoughts

    FWaaS brings powerful L3-L4 fire-walling capabilities directly into the OpenStack Neutron layer. For operators, enabling FWaaS means more secure, flexible, and tenant-aware networking. Whether you’re building secure enterprise workloads or multi-tenant clouds, FWaaS is a critical piece of cloud security posture.

    Related Posts

    • Beyond guesswork: Generating accurate ingress firewall rules with oc commatrix

    • Improve efficiency with OpenStack Services on OpenShift

    • How to update OpenStack Services on OpenShift

    • Enable confidential computing in OpenShift Virtualization

    Recent Posts

    • Debugging image mode with Red Hat OpenShift 4.20: A practical guide

    • EvalHub: Because "looks good to me" isn't a benchmark

    • SQL Server HA on RHEL: Meet Pacemaker HA Agent v2 (tech preview)

    • Deploy with confidence: Continuous integration and continuous delivery for agentic AI

    • Every layer counts: Defense in depth for AI agents with Red Hat AI

    What’s up next?

    Learning Path Deploy Palo Alto learning path feature image

    Deploy Palo Alto VM-Series firewalls with OpenShift Virtualization

    Learn how to implement Palo Alto network firewalls to your virtual machines...
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2026 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Chat Support

    Please log in with your Red Hat account to access chat support.