So since this thread is referenced in a few other sites as a how-to, I thought I'd write a clear answer to this question. To figure out how to get StrongVPN's OpenVPN service working, I flashed to tomato, did their auto setup, then went back to Merlin and copied everything StrongVPN automatically setup. Here's what I did:
1) download the .ovpn file and save it somewhere. We'll open it to copy the server key and certificate later.
2) go into your Merlin router GUI, go to VPN, OpenVPN Client.
3) import the .ovpn file
4) verify the settings, I had to make some changes:
Basic Settings:
Stats with WAN: Yes
Interface type: TUN
Protocol: UDP (you can change this if you changed it on StrongVPN. I'd stick with UDP, but iOS doesn't like the UDP .ovpn file so if you changed it for some reason, change your setting to TCP. Default StrongVPN is UDP)
Server Address and Port: should be automatically set
Firewall: automatic
Authorization mode: TLS
Username/Password Authentication: Yes
Copy your username/Pass from StrongVPN Website
Username / Password Auth. Only: No
Extra HMAC authorization: Outgoing (1)
Auth digest: MD5
Create NAT on tunnel: Yes
Advanced Settings:
Global Log verbosity: 4
Poll Interval: 0
Accept DNS Configuration: Exclusive
Encryption cipher: AES 256 CBC (this is the default, change it if you've changed it in StrongVPN)
Compression: Adaptive
TLS Renegotiation Time: 0
Connection Retry: 30
Verify Server Certificate: No
Redirect Internet traffic: All Traffic
5) now open up the .ovpn file in a reader, notepad, etc. we need to verify some info.
Under "advanced Settings" there's a spot for "Custom Configuration". You can delete almost everything there except for:
fragment 1390
hand-window 30
tun-mtu 1500
Confirm those values with your .ovpn file, or just leave whatever you have in the custom configuration.
Add the following two lines to the custom configuration too:
persist-key
ns-cert-type server
6) In Basic Settings, click "Content modification of Keys & Certificates" next to "Authorization Mode"
This brings up a bunch of boxes, but we only need to worry about "Static Key" and "Certificate Authority"
In your .ovpn, copy (no quotes, only for emphasis):
"-----BEGIN OpenVPN Static key V1-----
Bunch of values
-----END OpenVPN Static key V1----"
Paste that in Static Key
Then copy:
"-----BEGIN CERTIFICATE-----
Random Crap
-----END CERTIFICATE-----"
Paste that in Certificate Authority.
7). Apply Settings, and turn on the VPN. This should fix the issues with TLS errors and Client Key authentication errors. I got both as I was playing and is what I have now and it works for me.
Good Luck!