I confirm that on my second router, the firewall is OFF (otherwise 1.x devices cannot access 98.x devices) but nat is ON (otherwise devices on 98.x network do not have access to internet).
If the firewall is OFF, that pretty much explains it.
... the objective of all this set-up is to provide an on-demand OpenVPN Server via a second router connected to an AC/DC homePlug that can be switched on/off remotely. BTW this was
@eibgrad suggestion I saw in another threat.
You've now peaked my interest even further.
I hadn't even realized until you mentioned it, that this config was your attempt to implement my suggestion about placing the OpenVPN server on its own device. Had I known, I probably wouldn't have made my initial error in assessing your problems.
So obviously you've configured the VPN server using a routed config (WAN to LAN wrt the primary router), hence why you need access upstream over its WAN to the 192.168.1.0/24 network.
While that will work, it would have been preferable to configure the secondary router as a bridge (e.g., AP mode, LAN to LAN), so it's LAN remains within the scope of the private network. Then the issues in this thread wouldn't have ever been raised. Not unless you've now decided to take advantage of the fact you have a secondary local network. But in general, that's best avoided since it can lead to its own problems (some of which you're now dealing with).
All that said, I don't know if perhaps Merlin only binds the VPN to the WAN. If that's the case, then obviously you have to use a routed configuration. But in my own case, I'm using FT (FreshTomato), and it has no such restriction. It's connected LAN to LAN wrt my private network. It just keeps things simpler. But if you must use a routed config, I personally would have limited the purpose of that VPN router to *only* providing access to the primary router's network (192.168.1.0/24) and nothing else. But that decision is up to you.