Free 7-Day Trials: UFree 7-Day Trials: Unlimited Token Plan & Coding Plan. Claim NowDeepSeek V3.1

CWC OpenClaw

1. Create a CPU VM

Step 1:Navigate to Cloud Platform -> Virtual Machines -> VM Table.

Select KEF-3 as the Data Center in the top-right corner, then choose to create a CPU server and select the CPU VM specifications that suit your needs.

Add Provider

Step 2: Set the virtual machine name and password, then enter your Canopy Wave API Key. The system will automatically connect to our Kimi K2.5 model when creating the VM. You may also skip entering the API Key and configure your preferred model later.

Add Provider

After the VM is created, you need to allocate an IP address. Each instance can be assigned one Public IP address. Once allocated, connect to the VM using:

ssh ubuntu@your-ip-address

2. Configure Your Channels

After connecting to the VM, use openclaw tui to verify that the model connection is successful.

Add Provider

Then use openclaw channels add to add the channels you want to connect to. Configure your bot's token and permissions, and you can start interacting with them.

3. Public HTTPS Access Configuration

To enable secure public access to your Gateway, follow these authentication steps:

Step 1: Obtain Your Gateway Token

Access the OpenClaw Dashboard to retrieve your authentication token:

openclaw dashboard

Navigate to the Gateway section and copy your personal access token.

Step 2: Authenticate via Web Interface

Visit your Gateway's public address:

https://<your-public-ip>:18789

Enter your token in the authentication field to access the Gateway management interface.

Step 3: Approve Device Requests

When a new device attempts to connect, you must explicitly approve it:

1. List pending device requests:

openclaw devices list

  • Look for devices with status pending and note the request_id.

2. Approve the specific device:

openclaw devices approve <request_id>

  • Replace <request_id> with the actual ID from the list above.

4. Security Best Practices

RiskMitigation
Token TheftStore your API key and Gateway Token in a secure vault (e.g., password manager). Never commit them to Git repositories.
Unauthorized AccessOnly approve request_ids from known, trusted devices. Verify the device fingerprint before approval.
Man-in-the-MiddleEnsure HTTPS (port 18789) is enforced. Do not use HTTP for public access.

If you need any help or have questions, feel free to contact us via Discord or Online Customer Support .Our support team is always here for you.