This is exactly why it's vital to see these dumps, because just a quick look shows the problem. And some of the other details NOT mentioned in previous posts.
What I'm seeing is that the firewall rules in each instance are vastly different. In the case of 192.168.178.0/24 being unreachable, I see the OpenVPN client (tun11) doesn't even have the necessary call to the OVPN chain in either the INPUT or FORWARD chains (that's *always* supposed to be present). There's also missing DROP rules at the end of the INPUT and FORWARD chains. Plus, I see a specific rule denying access from br0 to vlan1. But I'm not sure at this point if vlan1 is supposed to be the WAN. On top of all that, I can see you've implemented port forwarding over the VPN.
What I suspect is happening is that you've made the mistake (or something else you're depending on for it) of including your FORWARDing rules for this port forwarding over the VPN in the nat-start script, rather than its own firewall-start script. That is likely to lead to corruption of the firewall, as described in the following link.
I am switching to T-Mobile home internet, and have run into a snag. I previously had used port forwarding on the router to publish RDP onto the internet on a non-standard port (let’s call it 1234). So, if you hit , a port forwarding rule would route that to 192.168.1.2:3389. Worked great...
www.snbforums.com
And as I said in that link, you don't even need the FORWARD rules anyway, since there's already a rule in the FORWARD chain that allows DNAT'd connections to be forwarded.
That would explain why it's so quirky. The corruption is intermittent. It may occur sometimes and NOT other times. It's just a matter of the timing by the router of when it configures the NAT and FILTER tables, and any calls to the nat-start and firewall-start scripts.
So that's the first thing I would correct. There may be other issues as well, particularly when using any of these AddOn scripts. Sometimes they can create conflicts of their own, since they are developed and managed independently of the firmware.