Part of syslog
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 TLS: Initial packet from [AF_INET]220.235.75.247:50003 (via [AF_INET]61.245.132.243%eth0), sid=eace4ffe cc683ded
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=RT-AC86U, emailAddress=
me@asusrouter.lan
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=client, emailAddress=
me@asusrouter.lan
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_VER=2.4.11
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_PLAT=linux
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_PROTO=2
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_NCP=2
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-256-CBC:AES-128-CBC:BF-CBC
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_LZ4=1
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_LZ4v2=1
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_LZO=1
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_COMP_STUB=1
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_COMP_STUBv2=1
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 peer info: IV_TCPNL=1
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 TLS: Username/Password authentication succeeded for username 'NASDEA39D'
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1557', remote='link-mtu 1541'
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 1024 bit RSA, signature: RSA-SHA256
Feb 17 18:06:56 ovpn-server1[24519]: 220.235.75.247:50003 [client] Peer Connection Initiated with [AF_INET]220.235.75.247:50003 (via [AF_INET]61.245.132.243%eth0)
Feb 17 18:06:56 ovpn-server1[24519]: client/220.235.75.247:50003 MULTI_sva: pool returned IPv4=192.168.1.2, IPv6=(Not enabled)
Feb 17 18:06:56 ovpn-server1[24519]: client/220.235.75.247:50003 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_350e32de2a452396.tmp
Feb 17 18:06:56 ovpn-server1[24519]: client/220.235.75.247:50003 MULTI: Learn: 192.168.1.6 -> client/220.235.75.247:50003
Feb 17 18:06:56 ovpn-server1[24519]: client/220.235.75.247:50003 MULTI: primary virtual IP for client/220.235.75.247:50003: 192.168.1.6
Feb 17 18:06:56 ovpn-server1[24519]: client/220.235.75.247:50003 Data Channel: using negotiated cipher 'AES-256-GCM'
Feb 17 18:06:56 ovpn-server1[24519]: client/220.235.75.247:50003 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 17 18:06:56 ovpn-server1[24519]: client/220.235.75.247:50003 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 17 18:06:57 wlceventd: wlceventd_proc_event(527): eth5: Auth 72:08:EE:A3:27
A, status: Successful (0), rssi:0
Feb 17 18:06:57 wlceventd: wlceventd_proc_event(537): eth5: ReAssoc 72:08:EE:A3:27
A, status: Successful (0), rssi:0
Feb 17 18:06:58 ovpn-server1[24519]: client/220.235.75.247:50003 PUSH: Received control message: 'PUSH_REQUEST'
Feb 17 18:06:58 ovpn-server1[24519]: client/220.235.75.247:50003 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0 vpn_gateway 500,dhcp-option DOMAIN lan,dhcp-option DNS 192.168.0.1,route-gateway 192.168.1.1,topology subnet,ping 15,ping-restart 60,ifconfig 192.168.1.6 192.168.1.5,peer-id 17,cipher AES-256-GCM' (status=1)
Feb 17 18:06:58 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 72:08:EE:A3:27
A, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Feb 17 18:06:58 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 72:08:EE:A3:27
A, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Feb 17 18:06:59 ovpn-server1[24519]: client/192.168.0.200:49409 [client] Inactivity timeout (--ping-restart), restarting
Feb 17 18:06:59 ovpn-server1[24519]: client/192.168.0.200:49409 SIGUSR1[soft,ping-restart] received, client-instance restarting
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 TLS: Initial packet from [AF_INET]192.168.0.200:37844 (via [AF_INET]61.245.132.243%br0), sid=a75bc4c4 c7c63853
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=RT-AC86U, emailAddress=
me@asusrouter.lan
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=client, emailAddress=
me@asusrouter.lan
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_VER=2.4.11
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_PLAT=linux
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_PROTO=2
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_NCP=2
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-256-CBC:AES-128-CBC:BF-CBC
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_LZ4=1
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_LZ4v2=1
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_LZO=1
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_COMP_STUB=1
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_COMP_STUBv2=1
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 peer info: IV_TCPNL=1
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 TLS: Username/Password authentication succeeded for username 'NAS08BF0B'
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1557', remote='link-mtu 1541'
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 1024 bit RSA, signature: RSA-SHA256
Feb 17 18:07:03 ovpn-server1[24519]: 192.168.0.200:37844 [client] Peer Connection Initiated with [AF_INET]192.168.0.200:37844 (via [AF_INET]61.245.132.243%br0)
Feb 17 18:07:03 ovpn-server1[24519]: client/192.168.0.200:37844 MULTI_sva: pool returned IPv4=192.168.1.2, IPv6=(Not enabled)
Feb 17 18:07:03 ovpn-server1[24519]: client/192.168.0.200:37844 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_32f6e62b59d43e31.tmp
Feb 17 18:07:03 ovpn-server1[24519]: client/192.168.0.200:37844 MULTI: Learn: 192.168.1.10 -> client/192.168.0.200:37844
Feb 17 18:07:03 ovpn-server1[24519]: client/192.168.0.200:37844 MULTI: primary virtual IP for client/192.168.0.200:37844: 192.168.1.10
Feb 17 18:07:03 ovpn-server1[24519]: client/192.168.0.200:37844 Data Channel: using negotiated cipher 'AES-256-GCM'
Feb 17 18:07:03 ovpn-server1[24519]: client/192.168.0.200:37844 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 17 18:07:03 ovpn-server1[24519]: client/192.168.0.200:37844 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 17 18:07:04 ovpn-server1[24519]: client/192.168.0.200:37844 PUSH: Received control message: 'PUSH_REQUEST'
Feb 17 18:07:04 ovpn-server1[24519]: client/192.168.0.200:37844 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0 vpn_gateway 500,dhcp-option DOMAIN lan,dhcp-option DNS 192.168.0.1,route-gateway 192.168.1.1,topology subnet,ping 15,ping-restart 60,ifconfig 192.168.1.10 192.168.1.9,peer-id 0,cipher AES-256-GCM' (status=1)