Network Model
This content has been merged into Network. See that page for the current guide.Most operations flow through the Gateway (
openclaw gateway), a single long-running
process that owns channel connections and the WebSocket control plane.
Core rules
- One Gateway per host is recommended. It is the only process allowed to own the WhatsApp Web session. For rescue bots or strict isolation, run multiple gateways with isolated profiles and ports. See Multiple gateways.
- Loopback first: the Gateway WS defaults to
ws://127.0.0.1:18789. The wizard creates shared-secret auth by default and usually generates a token, even for loopback. For non-loopback access, use a valid gateway auth path: shared-secret token/password auth, or a correctly configured non-loopbacktrusted-proxydeployment. Tailnet/mobile setups usually work best through Tailscale Serve or anotherwss://endpoint instead of raw tailnetws://. - Nodes connect to the Gateway WS over LAN, tailnet, or SSH as needed. The legacy TCP bridge has been removed.
- Canvas host is served by the Gateway HTTP server on the same port as the Gateway (default
18789):/__openclaw__/canvas//__openclaw__/a2ui/Whengateway.authis configured and the Gateway binds beyond loopback, these routes are protected by Gateway auth. Node clients use node-scoped capability URLs tied to their active WS session. See Gateway configuration (canvasHost,gateway).
- Remote use is typically SSH tunnel or tailnet VPN. See Remote access and Discovery.