Remote Gateway Setup
Run the SimpleClaw Gateway on a remote server (VPS, cloud instance) and connect from your local devices.Why Run Remotely?
- Always-on - Gateway runs 24/7 without tying up your laptop
- Centralized - One gateway for all your devices
- Resource efficient - Small VPS can handle multiple channels
- Device flexibility - Connect from macOS, iOS, Android, web
Architecture
Quick Start
Provision Server
Recommended specs:
- 1-2 CPU cores
- 2GB RAM
- 20GB storage
- Ubuntu 22.04 or Debian 12
Run Onboarding
- Create config directory
- Configure Gateway
- Set up systemd service (for Linux)
- Start the Gateway
Access Methods
Option 1: Tailscale (Recommended)
Tailscale provides secure, zero-config networking.Option 2: SSH Tunnel
Use SSH port forwarding for secure access.Option 3: Public HTTPS (Advanced)
Expose Gateway with reverse proxy (nginx/caddy) + TLS. Security warning: Only do this with strong authentication enabled.Configuration
Gateway Bind Settings
"loopback" bind for remote setups. Access via Tailscale/tunnel/reverse proxy.
Tailscale Configuration
Managing the Gateway
Systemd Service (Linux)
Aftersimpleclaw onboard --install-daemon, the Gateway runs as a systemd service.
Manual Start
Run Gateway manually in tmux/screen:Device Nodes
Device nodes (macOS, iOS, Android) can execute device-specific commands when paired:Scan on Device
- macOS App: Preferences → Nodes → Pair Device
- iOS App: Settings → Pair Device
- Android App: Settings → Pair Device
Node Commands
Once paired, the Gateway can invoke device commands:Security Best Practices
Security Checklist
- Gateway bind set to
loopback - Strong password configured if using public access
- Firewall rules limit access to port 18789
- SSH key-based auth (disable password SSH)
- Tailscale ACLs configured
- Regular system updates
- Channel allowlists configured
- DM policy set to
pairingorblocked
Monitoring
Health Checks
Log Monitoring
Backups
Important directories to back up:Upgrading
Troubleshooting
Cannot connect to remote Gateway
Cannot connect to remote Gateway
-
Verify Gateway is running:
-
Check Tailscale status:
-
Test SSH tunnel:
Channels not connecting
Channels not connecting
-
Check server logs:
-
Verify channel config:
-
Test channel authentication:
High latency
High latency
- Use Tailscale for better routing
- Check server location (closer is better)
- Monitor server resources:
Next Steps
Custom Skills
Add custom tools to your remote Gateway
Webhooks
Trigger agent runs from external services
Multi-Agent Setup
Run multiple specialized agents
Troubleshooting
Common remote setup issues