Tick the box "Allow other network users to connect through this computer's Internet connection"
From the drop-down list select "Local Area Connection 2", or whatever is the connection name of your TAP server connection.
There doesn't drop any list down

The server's log:
Tue Nov 06 21:23:56 2012 pc-30/89.236.13.177:61472 SIGTERM[soft,remote-exit] received, client-instance exiting
Tue Nov 06 21:24:15 2012 MULTI: multi_create_instance called
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 Re-using SSL/TLS context
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 LZO compression initialized
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 Local Options hash (VER=V4): '530fdded'
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 Expected Remote Options hash (VER=V4): '41690919'
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 TLS: Initial packet from 89.236.13.177:61542, sid=1edbfe75 5660451a
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 VERIFY OK: depth=1, /C=DK/ST=DK/L=Bagsvaerd/O=Beregnerservice/OU=Malerkalk/CN=pc30/name=changeme/emailAddress=vif@itogav.dk
Tue Nov 06 21:24:15 2012 89.236.13.177:61542 VERIFY OK: depth=0, /C=DK/ST=DK/L=Gentofte/O=Beregnerservice/OU=support/CN=pc-30/name=changeme/emailAddress=vif@itogav.dk
Tue Nov 06 21:24:16 2012 89.236.13.177:61542 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Nov 06 21:24:16 2012 89.236.13.177:61542 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 06 21:24:16 2012 89.236.13.177:61542 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Nov 06 21:24:16 2012 89.236.13.177:61542 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 06 21:24:16 2012 89.236.13.177:61542 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Nov 06 21:24:16 2012 89.236.13.177:61542 [pc-30] Peer Connection Initiated with 89.236.13.177:61542
Tue Nov 06 21:24:16 2012 pc-30/89.236.13.177:61542 MULTI: Learn: 10.0.0.6 -> pc-30/89.236.13.177:61542
Tue Nov 06 21:24:16 2012 pc-30/89.236.13.177:61542 MULTI: primary virtual IP for pc-30/89.236.13.177:61542: 10.0.0.6
Tue Nov 06 21:24:18 2012 pc-30/89.236.13.177:61542 PUSH: Received control message: 'PUSH_REQUEST'
Tue Nov 06 21:24:18 2012 pc-30/89.236.13.177:61542 SENT CONTROL [pc-30]: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,route 10.0.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.0.0.6 10.0.0.5' (status=1)
the clients log:
Tue Nov 06 21:24:07 2012 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Tue Nov 06 21:24:07 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Tue Nov 06 21:24:07 2012 LZO compression initialized
Tue Nov 06 21:24:07 2012 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Nov 06 21:24:07 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Nov 06 21:24:07 2012 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Nov 06 21:24:07 2012 Local Options hash (VER=V4): '41690919'
Tue Nov 06 21:24:07 2012 Expected Remote Options hash (VER=V4): '530fdded'
Tue Nov 06 21:24:07 2012 UDPv4 link local: [undef]
Tue Nov 06 21:24:07 2012 UDPv4 link remote: 93.167.4.126:1194
Tue Nov 06 21:24:07 2012 TLS: Initial packet from 93.167.4.126:1194, sid=ef28ac0f 75df05b3
Tue Nov 06 21:24:07 2012 VERIFY OK: depth=1, /C=DK/ST=DK/L=Bagsvaerd/O=Beregnerservice/OU=Malerkalk/CN=pc30/name=changeme/emailAddress=vif@itogav.dk
Tue Nov 06 21:24:07 2012 VERIFY OK: nsCertType=SERVER
Tue Nov 06 21:24:07 2012 VERIFY OK: depth=0, /C=DK/ST=DK/L=Bagsvaerd/O=Beregnerservice/OU=changeme/CN=changeme/name=changeme/emailAddress=vif@itogav.dk
Tue Nov 06 21:24:08 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Nov 06 21:24:08 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 06 21:24:08 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Nov 06 21:24:08 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 06 21:24:08 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Nov 06 21:24:08 2012 [changeme] Peer Connection Initiated with 93.167.4.126:1194
Tue Nov 06 21:24:10 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Tue Nov 06 21:24:10 2012 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,route 10.0.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.0.0.6 10.0.0.5'
Tue Nov 06 21:24:10 2012 OPTIONS IMPORT: timers and/or timeouts modified
Tue Nov 06 21:24:10 2012 OPTIONS IMPORT: --ifconfig/up options modified
Tue Nov 06 21:24:10 2012 OPTIONS IMPORT: route options modified
Tue Nov 06 21:24:10 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Nov 06 21:24:10 2012 ROUTE default_gateway=192.168.2.1
Tue Nov 06 21:24:10 2012 TAP-WIN32 device [OpenVPN-1] opened: \\.\Global\{268CB66C-B6CC-4551-ADEA-46A5AE82464F}.tap
Tue Nov 06 21:24:10 2012 TAP-Win32 Driver Version 9.9
Tue Nov 06 21:24:10 2012 TAP-Win32 MTU=1500
Tue Nov 06 21:24:10 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.0.0.6/255.255.255.252 on interface {268CB66C-B6CC-4551-ADEA-46A5AE82464F} [DHCP-serv: 10.0.0.5, lease-time: 31536000]
Tue Nov 06 21:24:10 2012 Successful ARP Flush on interface [393220] {268CB66C-B6CC-4551-ADEA-46A5AE82464F}
Tue Nov 06 21:24:12 2012 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
Tue Nov 06 21:24:12 2012 Route: Waiting for TUN/TAP interface to come up...
Tue Nov 06 21:24:14 2012 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Tue Nov 06 21:24:14 2012 C:\WINDOWS\system32\route.exe ADD 93.167.4.126 MASK 255.255.255.255 192.168.2.1
Tue Nov 06 21:24:14 2012 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.0.0.5
Tue Nov 06 21:24:14 2012 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.0.0.5
Tue Nov 06 21:24:15 2012 C:\WINDOWS\system32\route.exe ADD 10.0.0.1 MASK 255.255.255.255 10.0.0.5
Tue Nov 06 21:24:15 2012 Initialization Sequence Completed.
Hope somebody can figure out what to do.
Best regards
Villy