I can ping all those devices though. I suspect my local router (not my home router which is my VPN server) is blocking something because if I use my phone hotspot I don't have any issues. What is being blocked?
Local router is a Vodafone HG658c and home router is a Linksys WRT1900acs if that helps. And here is my client configuration file.
Client Config
client
dev tun
proto udp
remote XXXXXXXX 1194
tun-mtu 6000
# fragment 0 can be used to improve performance in some instances but
# breaks compatibility with some Android apps
# fragment 0
mssfix 0
resolv-retry infinite
nobind
persist-key
persist-tun
ns-cert-type server
auth-user-pass
verb 3
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXX
-----END CERTIFICATE-----
</ca>
<cert>
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, ST=CA, L=Irvine, O=Linksys, OU=Belkin, CN=Mamba/name=BlackMamba/emailAddress=support@linksys.com
Validity
Not Before: Oct 11 06:00:44 2012 GMT
Not After : Oct 9 06:00:44 2022 GMT
Subject: C=US, ST=CA, L=Irvine, O=Linksys, OU=Belkin, CN=client/name=BlackMamba/emailAddress=support@linksys.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
XXXXXXXX
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
Easy-RSA Generated Certificate
X509v3 Subject Key Identifier:
XXXXXXXX
X509v3 Authority Key Identifier:
keyid:63:8B:23:CA:33:6D:10:16:14:9B:89:32:F4:3C:49:44:25:A1:CD:1F
DirName:/C=US/ST=CA/L=Irvine/O=Linksys/OU=Belkin/CN=Mamba/name=BlackMamba/emailAddress=support@linksys.com
serial:F4:42:5A:B1:95:ED:E4:F4
X509v3 Extended Key Usage:
TLS Web Client Authentication
X509v3 Key Usage:
Digital Signature
Signature Algorithm: sha1WithRSAEncryption
XXXXXXXX
-----BEGIN CERTIFICATE-----
XXXXXXXX
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
XXXXXXXX
-----END PRIVATE KEY-----
</key>
# Auto-generated configuration file from BlueSialia-Link
# Mon Feb 15 10:28:49 UTC 2021 MCF1
dev tun
proto udp
remote XXXXXXXX 1194
tun-mtu 6000
# fragment 0 can be used to improve performance in some instances but
# breaks compatibility with some Android apps
# fragment 0
mssfix 0
resolv-retry infinite
nobind
persist-key
persist-tun
ns-cert-type server
auth-user-pass
verb 3
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXX
-----END CERTIFICATE-----
</ca>
<cert>
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, ST=CA, L=Irvine, O=Linksys, OU=Belkin, CN=Mamba/name=BlackMamba/emailAddress=support@linksys.com
Validity
Not Before: Oct 11 06:00:44 2012 GMT
Not After : Oct 9 06:00:44 2022 GMT
Subject: C=US, ST=CA, L=Irvine, O=Linksys, OU=Belkin, CN=client/name=BlackMamba/emailAddress=support@linksys.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
XXXXXXXX
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
Easy-RSA Generated Certificate
X509v3 Subject Key Identifier:
XXXXXXXX
X509v3 Authority Key Identifier:
keyid:63:8B:23:CA:33:6D:10:16:14:9B:89:32:F4:3C:49:44:25:A1:CD:1F
DirName:/C=US/ST=CA/L=Irvine/O=Linksys/OU=Belkin/CN=Mamba/name=BlackMamba/emailAddress=support@linksys.com
serial:F4:42:5A:B1:95:ED:E4:F4
X509v3 Extended Key Usage:
TLS Web Client Authentication
X509v3 Key Usage:
Digital Signature
Signature Algorithm: sha1WithRSAEncryption
XXXXXXXX
-----BEGIN CERTIFICATE-----
XXXXXXXX
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
XXXXXXXX
-----END PRIVATE KEY-----
</key>
# Auto-generated configuration file from BlueSialia-Link
# Mon Feb 15 10:28:49 UTC 2021 MCF1