Hi, my config is: RUT950: IP WAN: IP PUBLIC - IP LAN: 10.0.155.10
CONFIG OPENVPN
config webui 'webui'
option _auth 'tls'
config openvpn 'RPT'
option keepalive '10 120'
option _name 'RPT'
option _tls_cipher 'all'
list data_ciphers 'BF-CBC'
option persist_key '1'
option port '1194'
option mode 'server'
option persist_tun '1'
option verb '5'
option type 'server'
option proto 'udp'
option enable '1'
option dev 'tap'
option enable_custom '0'
option client_to_client '1'
option duplicate_cn '0'
option _device_files '0'
option comp_lzo 'yes'
option _auth 'tls'
option auth 'sha1'
option _tls_auth 'none'
option ca '/etc/vuci-uploads/cbid.openvpn.RPT.caca.crt'
option cert '/etc/vuci-uploads/cbid.openvpn.RPT.certserver.crt'
option key '/etc/vuci-uploads/cbid.openvpn.RPT.keyserver.key'
option dh '/etc/vuci-uploads/cbid.openvpn.RPT.dhdh.pem'
option cipher 'AES-256-CBC'
option tls_server '1'
option server_bridge 'nogw'
list push 'route 10.0.155.1 255.255.255.0'
option upload_files '0'
-------------------------------------
Mon Sep 12 11:37:25 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Mon Sep 12 11:37:25 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 TLS: Initial packet from [AF_INET]190.28.69.114:60341, sid=33791165 fdaf529b
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 VERIFY OK: depth=1, CN=Easy-RSA CA
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 VERIFY OK: depth=0, CN=Client01
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_VER=2.4.7
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_PLAT=linux
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_PROTO=2
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_NCP=2
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_LZ4=1
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_LZ4v2=1
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_LZO=1
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_COMP_STUB=1
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_COMP_STUBv2=1
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_TCPNL=1
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 [Client0101] Peer Connection Initiated with [AF_INET]190.28.69.114:60341
Mon Sep 12 11:37:26 2022 daemon.err openvpn(RPT)[8266]: Client01/190.28.69.114:60341 MULTI: no dynamic or static remote--ifconfig address is available for Client0101/190.28.69.114:60341
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 12 11:37:27 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 PUSH: Received control message: 'PUSH_REQUEST'
Mon Sep 12 11:37:27 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 SENT CONTROL [Client01]: 'PUSH_REPLY,route 10.0.155.1 255.255.255.0,ping 10,ping-restart 120,peer-id 42,cipher AES-256-CBC' (status=1)