docs/gateway/network-model.md
This content has been merged into Network. See that page for the current guide.
Most operations flow through the Gateway (openclaw gateway), a single long-running
process that owns channel connections and the WebSocket control plane.
ws://127.0.0.1:18789. The wizard creates shared-secret auth by default and usually generates a token, even for loopback. For non-loopback access, use a valid gateway auth path: shared-secret token/password auth, or a correctly configured non-loopback trusted-proxy deployment. Tailnet/mobile setups usually work best through Tailscale Serve or another wss:// endpoint instead of raw tailnet ws://.18789):
/__openclaw__/canvas//__openclaw__/a2ui/
When gateway.auth is configured and the Gateway binds beyond loopback, these routes are protected by Gateway auth. Node clients use node-scoped capability URLs tied to their active WS session. See Gateway configuration (canvasHost, gateway).