Error connecting to VPN - the client is starting

Hello,

I recently purchased GLINET router – Beryl GL-MT3000.

I set it up, connected to my internal network and trying to set up connecting to NordVPN server. I created NordVPN profile, added some specific countries, but when I try to connect, I get an error.
In the dashboard I get the message that client is starting up, but the message never disappears. In the log I see some errors and the status is “The client is starting, please wait…”
The WAN port is connected to my home network and a laptop is connected to a LAN port. When VPN is enable i am unable to connect to internet.
Please help understand what is going on and how to fix the issue.

Log
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: NOTE: --fast-io is disabled since we are not using UDP
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.187.69.67:443
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: Attempting to establish TCP connection with [AF_INET]31.187.69.67:443 [nonblock]
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: TCP connection established with [AF_INET]31.187.69.67:443
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: TCP_CLIENT link local: (not bound)
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: TCP_CLIENT link remote: [AF_INET]31.187.69.67:443
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: TLS: Initial packet from [AF_INET]31.187.69.67:443, sid=a57dc093 81d14004
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: VERIFY OK: depth=1, O=NordVPN, CN=NordVPN CA9
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: VERIFY KU OK
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: Validating certificate extended key usage
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: VERIFY EKU OK
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: VERIFY X509NAME OK: CN=fr892.nordvpn.com
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: VERIFY OK: depth=0, CN=fr892.nordvpn.com
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Sun Jun 2 22:14:05 2024 daemon.notice ovpnclient[32305]: [fr892.nordvpn.com] Peer Connection Initiated with [AF_INET]31.187.69.67:443
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: NOTE: --fast-io is disabled since we are not using UDP
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.187.69.67:443
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: Attempting to establish TCP connection with [AF_INET]31.187.69.67:443 [nonblock]
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: TCP connection established with [AF_INET]31.187.69.67:443
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: TCP_CLIENT link local: (not bound)
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: TCP_CLIENT link remote: [AF_INET]31.187.69.67:443
Sun Jun 2 22:14:58 2024 daemon.notice ovpnclient[1612]: TLS: Initial packet from [AF_INET]31.187.69.67:443, sid=76691a6a 27636334
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: VERIFY OK: depth=1, O=NordVPN, CN=NordVPN CA9
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: VERIFY KU OK
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: Validating certificate extended key usage
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: VERIFY EKU OK
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: VERIFY X509NAME OK: CN=fr892.nordvpn.com
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: VERIFY OK: depth=0, CN=fr892.nordvpn.com
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Sun Jun 2 22:14:59 2024 daemon.notice ovpnclient[1612]: [fr892.nordvpn.com] Peer Connection Initiated with [AF_INET]31.187.69.67:443
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Rule 'process_mark'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Rule 'wan_in_conn_mark'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Rule 'lan_in_conn_mark_restore'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Rule 'out_conn_mark_restore'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Zone 'lan'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Zone 'wan'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Zone 'guest'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Zone 'ovpnclient'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Set tcp_ecn to off
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Set tcp_syncookies to on
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Set tcp_window_scaling to on
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Running script '/etc/firewall.nat6'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Running script '/etc/firewall.vpn_server_policy.sh'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Running script '/var/etc/gls2s.include'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): ! Skipping due to path error: No such file or directory
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): * Running script '/usr/bin/gl_block.sh'
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): Failed to parse json data: unexpected character
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): uci: Entry not found
Sun Jun 2 22:15:38 2024 daemon.notice netifd: ovpnclient (3040): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Thanks

Thanks so much. It worked with service credentials.