My logs:
Fri Jul 22 19:59:09 2022 daemon.warn openvpn(client_VPN)[4548]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: OpenVPN 2.5.2 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Fri Jul 22 19:59:09 2022 daemon.warn openvpn(client_VPN)[4548]: WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
Fri Jul 22 19:59:09 2022 daemon.warn openvpn(client_VPN)[4548]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.xxx.xxx.xxx:1194
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: Attempting to establish TCP connection with [AF_INET]xxx.xxx.xxx.xxx:1194 [nonblock]
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: TCP connection established with [AF_INET]xxx.xxx.xxx.xxx:1194
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: TCP_CLIENT link local: (not bound)
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: TCP_CLIENT link remote: [AF_INET]xxx.xxx.xxx.xxx:1194
Fri Jul 22 19:59:09 2022 daemon.notice openvpn(client_VPN)[4548]: TLS: Initial packet from [AF_INET]xxx.xxx.xxx.xxx:1194, sid=23ac167c 76390999
Fri Jul 22 19:59:10 2022 daemon.notice openvpn(client_VPN)[4548]: VERIFY OK: depth=1, CN=ca
Fri Jul 22 19:59:10 2022 daemon.notice openvpn(client_VPN)[4548]: VERIFY OK: depth=0, CN=server
Fri Jul 22 19:59:11 2022 user.notice root: Warning: this sim get method (gpio.sh get SIM) is deprecated. Consider usin g ubus interface instead.
Fri Jul 22 19:59:12 2022 daemon.notice openvpn(client_VPN)[4548]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Fri Jul 22 19:59:12 2022 daemon.notice openvpn(client_VPN)[4548]: [server] Peer Connection Initiated with [AF_INET]xxx.xxx.xxx.xxx:1194
Fri Jul 22 19:59:13 2022 daemon.notice openvpn(client_VPN)[4548]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: PUSH: Received control message: 'PUSH_REPLY,ping 20,ping-restart 60,topology subnet,route-gateway 192.168.1.1,ifconfig 192.168.1.72 255.255.255.0'
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: OPTIONS IMPORT: route-related options modified
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: Using peer cipher 'AES-256-CBC'
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: net_route_v4_best_gw query: dst 0.0.0.0
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: net_route_v4_best_gw result: via 0.0.0.0 dev wwan0
Fri Jul 22 19:59:24 2022 daemon.notice openvpn(client_VPN)[4548]: /etc/openvpn/updown_dns tun_c_VPN 1500 1623 192.168.1.72 255.255.255.0 init
Fri Jul 22 19:59:25 2022 daemon.notice openvpn(client_VPN)[4548]: net_route_v4_add: 192.168.1.0/24 via 192.168.1.1 dev [NULL] table 0 metric -1
Fri Jul 22 19:59:25 2022 daemon.notice openvpn(client_VPN)[4548]: Initialization Sequence Completed