Forwarding to LAN via OpenVPN tunnel is broken

Hi I have configured my GL-MT-2500 as OpenVPN server. It is connected to WAN via public IP address and to LAN. GL-MT-2500 is not a default gateway for hosts on LAN. I have established OpenVpn session sucessfuly. OpenVPN client is getting IP address from 10.8.0.0/24 network.
Firewall is stopped on GL-MT-2500. Default gateway have a static route for 10.8.0.0/24 via LAN interface of GL-MT-2500. Also from client OpenVPN there is specfic route added to LAN network via tunnel interface. From OpenVPN client laptop I can ping default gateway and do ssh to this router. But for other hosts on this subnet I can only do ping - I can not reach any services like web page (https) or ssh. Firewall is not working so all traffic should pass GL-MT-2500 from WAN side. Beacuse I can do ping it looks like icmp redirect is working fine for icmp protocol. However for web or ssh this seems not to be working. Lookls like at some point packets are dropped on ingress to GL-MT-2500. Any idea here ?

What is the OS of the WEB https server? Linux or Windows? Seems it is Linux via 'SSH' you mentioned.
Is possible the firewall of the server OS drops the remote session?

If can ping (ICMP), thus the web (TCP) is supposed to work and access.

Update:
There is no need to set static routes in the default gateway. VPN server enable allow remote access LAN:
image

Hi Bruce

Web server is Synology NAS. I have "Remote access LAN" enabled. I need to have static route
on client because I have disabled default routing (so sending all traffic via tunnel) I want to access only LAN via tunnel not forward all Internet traffic over there. BTW when I have all traffic forwarded via tunnel - Internet was not working. I have solved this problem via NAT on LAN interface - just did masquerading on LAN so packets sourced from tunnel IP addresses 10.8.0.0/24 have source address replaced with interface address of GL-MT-2500.