Here my logs:
root@OpenWrt:~# uci show firewall; echo && uci show network; echo && uci show openvpn; echo && logread -e openvpn
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood='1'
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[0].network='lan'
firewall.@zone[0].masq='1'
firewall.@zone[0].mtu_fix='1'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@zone[1].network='wan wan6'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].src_ip='fc00::/6'
firewall.@rule[3].dest_ip='fc00::/6'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Input'
firewall.@rule[5].src='wan'
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-ICMPv6-Forward'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='*'
firewall.@rule[6].proto='icmp'
firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.@rule[6].limit='1000/sec'
firewall.@rule[6].family='ipv6'
firewall.@rule[6].target='ACCEPT'
firewall.@rule[7]=rule
firewall.@rule[7].name='Allow-IPSec-ESP'
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].proto='esp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].name='Allow-ISAKMP'
firewall.@rule[8].src='wan'
firewall.@rule[8].dest='lan'
firewall.@rule[8].dest_port='500'
firewall.@rule[8].proto='udp'
firewall.@rule[8].target='ACCEPT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
firewall.@zone[2]=zone
firewall.@zone[2].name='vpnclient'
firewall.@zone[2].input='REJECT'
firewall.@zone[2].output='ACCEPT'
firewall.@zone[2].forward='REJECT'
firewall.@zone[2].mtu_fix='1'
firewall.@zone[2].network='vpnclient'
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].src='lan'
firewall.@forwarding[1].dest='vpnclient'
firewall.@zone[3]=zone
firewall.@zone[3].name='vpnclient'
firewall.@zone[3].input='REJECT'
firewall.@zone[3].output='ACCEPT'
firewall.@zone[3].forward='REJECT'
firewall.@zone[3].mtu_fix='1'
firewall.@zone[3].network=' '
firewall.@forwarding[2]=forwarding
firewall.@forwarding[2].src='lan'
firewall.@forwarding[2].dest='vpnclient'
firewall.@zone[4]=zone
firewall.@zone[4].name='vpnclient'
firewall.@zone[4].network='vpnclient'
firewall.@zone[4].input='REJECT'
firewall.@zone[4].output='ACCEPT'
firewall.@zone[4].forward='REJECT'
firewall.@zone[4].masq='1'
firewall.@zone[4].mtu_fix='1'
firewall.@forwarding[3]=forwarding
firewall.@forwarding[3].src='lan'
firewall.@forwarding[3].dest='vpnclient'
firewall.@zone[5]=zone
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd38:bf82:0f80::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.ifname='eth0.1'
network.lan.proto='static'
network.lan.ipaddr='192.168.1.1'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.wan=interface
network.wan.ifname='eth1.2'
network.wan.proto='dhcp'
network.wan.type='bridge'
network.wan6=interface
network.wan6.ifname='eth1.2'
network.wan6.proto='dhcpv6'
network.@switch[0]=switch
network.@switch[0].name='switch0'
network.@switch[0].reset='1'
network.@switch[0].enable_vlan='1'
network.@switch_vlan[0]=switch_vlan
network.@switch_vlan[0].device='switch0'
network.@switch_vlan[0].vlan='1'
network.@switch_vlan[0].ports='0 1 2 3 5t'
network.@switch_vlan[1]=switch_vlan
network.@switch_vlan[1].device='switch0'
network.@switch_vlan[1].vlan='2'
network.@switch_vlan[1].ports='4 6t'
network.vpnclient=interface
network.vpnclient.ifname='tun0'
network.vpnclient.proto='none'
network.vpnclient.auto='1'
openvpn.custom_config=openvpn
openvpn.custom_config.config='/etc/openvpn/my-vpn.conf'
openvpn.sample_server=openvpn
openvpn.sample_server.port='1194'
openvpn.sample_server.proto='udp'
openvpn.sample_server.dev='tun'
openvpn.sample_server.ca='/etc/openvpn/ca.crt'
openvpn.sample_server.cert='/etc/openvpn/server.crt'
openvpn.sample_server.key='/etc/openvpn/server.key'
openvpn.sample_server.dh='/etc/openvpn/dh1024.pem'
openvpn.sample_server.server='10.8.0.0 255.255.255.0'
openvpn.sample_server.ifconfig_pool_persist='/tmp/ipp.txt'
openvpn.sample_server.keepalive='10 120'
openvpn.sample_server.compress='lzo'
openvpn.sample_server.persist_key='1'
openvpn.sample_server.persist_tun='1'
openvpn.sample_server.user='nobody'
openvpn.sample_server.status='/tmp/openvpn-status.log'
openvpn.sample_server.verb='3'
openvpn.sample_client=openvpn
openvpn.sample_client.client='1'
openvpn.sample_client.dev='tun'
openvpn.sample_client.proto='udp'
openvpn.sample_client.remote='my_server_1 1194'
openvpn.sample_client.resolv_retry='infinite'
openvpn.sample_client.nobind='1'
openvpn.sample_client.persist_key='1'
openvpn.sample_client.persist_tun='1'
openvpn.sample_client.user='nobody'
openvpn.sample_client.ca='/etc/openvpn/ca.crt'
openvpn.sample_client.cert='/etc/openvpn/client.crt'
openvpn.sample_client.key='/etc/openvpn/client.key'
openvpn.sample_client.compress='lzo'
openvpn.sample_client.verb='3'
openvpn.vpnclient=openvpn
openvpn.vpnclient.enabled='1'
openvpn.vpnclient.config='/etc/openvpn/vpnclient.ovpn'
openvpn.vpnclient.ca='/etc/easy-rsa/keys/ca.crt'
openvpn.vpnclient.cert='/etc/luci-uploads/cbid.openvpn.vpnclient.cert'
openvpn.vpnclient.key='/etc/luci-uploads/cbid.openvpn.vpnclient.key'
openvpn.vpnclient.verb='7'
openvpn.vpnclient.proto='tcp'
Thu Dec 27 17:20:01 2018 daemon.err openvpn(vpnclient)[14675]: event_wait : Interrupted system call (code=4)
Thu Dec 27 17:20:01 2018 daemon.notice openvpn(vpnclient)[14675]: SIGTERM received, sending exit notification to peer
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: TCP/UDP: Closing socket
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: /sbin/route del -net 10.244.200.1 netmask 255.255.255.255
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: /sbin/route del -net 185.210.219.140 netmask 255.255.255.255
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: Closing TUN/TAP interface
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: /sbin/ifconfig tun0 0.0.0.0
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[14675]: SIGTERM[soft,exit-with-notification] received, process exiting
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: OpenVPN 2.4.5 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: LZO compression initializing
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Control Channel MTU parms [ L:1626 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ]
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ]
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1574,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1574,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.210.219.139:443
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: UDP link local: (not bound)
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: UDP link remote: [AF_INET]185.210.219.139:443
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: TLS: Initial packet from [AF_INET]185.210.219.139:443, sid=a49d18f6 fbb40b42
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: VERIFY KU OK
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Validating certificate extended key usage
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: VERIFY EKU OK
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server Node vienna-s02, emailAddress=info@cyberghost.ro
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Dec 27 17:20:03 2018 daemon.notice openvpn(vpnclient)[16395]: [CyberGhost VPN Server Node vienna-s02] Peer Connection Initiated with [AF_INET]185.210.219.139:443
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: SENT CONTROL [CyberGhost VPN Server Node vienna-s02]: 'PUSH_REQUEST' (status=1)
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: PUSH: Received control message: 'PUSH_REPLY,sndbuf 393216,rcvbuf 393216,comp-lzo no,redirect-gateway def1,dhcp-option DNS 194.187.251.67,dhcp-option DNS 185.93.180.131,dhcp-option DNS 83.143.245.42,route 10.245.200.1,topology net30,ifconfig 10.245.202.54 10.245.202.53,peer-id 12,cipher AES-256-GCM'
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: compression parms modified
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: route options modified
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: peer-id set
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: adjusting link_mtu to 1629
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: Data Channel MTU parms [ L:1557 D:1300 EF:57 EB:407 ET:0 EL:3 ]
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: TUN/TAP device tun0 opened
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: TUN/TAP TX queue length set to 100
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Dec 27 17:20:04 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/ifconfig tun0 10.245.202.54 pointopoint 10.245.202.53 mtu 1500
Thu Dec 27 17:20:10 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route add -net 185.210.219.139 netmask 255.255.255.255 gw 10.0.0.1
Thu Dec 27 17:20:10 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.245.202.53
Thu Dec 27 17:20:10 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.245.202.53
Thu Dec 27 17:20:10 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route add -net 10.245.200.1 netmask 255.255.255.255 gw 10.245.202.53
Thu Dec 27 17:20:10 2018 daemon.notice openvpn(vpnclient)[16395]: Initialization Sequence Completed
Thu Dec 27 17:22:42 2018 daemon.err openvpn(vpnclient)[16395]: event_wait : Interrupted system call (code=4)
Thu Dec 27 17:22:42 2018 daemon.notice openvpn(vpnclient)[16395]: SIGTERM received, sending exit notification to peer
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: TCP/UDP: Closing socket
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route del -net 10.245.200.1 netmask 255.255.255.255
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route del -net 185.210.219.139 netmask 255.255.255.255
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: Closing TUN/TAP interface
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: /sbin/ifconfig tun0 0.0.0.0
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16395]: SIGTERM[soft,exit-with-notification] received, process exiting
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: OpenVPN 2.4.5 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: LZO compression initializing
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: Control Channel MTU parms [ L:1626 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ]
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ]
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1574,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1574,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.244.212.171:443
Thu Dec 27 17:22:44 2018 daemon.notice openvpn(vpnclient)[16786]: Socket Buffers: R=[163840->163840] S=[163840->163840]