Thanks for your reply, here are the logs and the screenshot:
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: TCPv4_CLIENT link local: [undef]
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: TCPv4_CLIENT link remote: [AF_INET]185.94.189.172:443
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: TLS: Initial packet from [AF_INET]185.94.189.172:443, sid=32984ad4 269cfcf1
Sat Mar 11 10:37:25 2017 daemon.warn openvpn[5368]: WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr15.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: Validating certificate key usage
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: ++ Certificate has key usage 00a0, expects 00a0
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: VERIFY KU OK
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: Validating certificate extended key usage
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: VERIFY EKU OK
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr15.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: Data Channel Encrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: Data Channel Encrypt: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: Data Channel Decrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: Data Channel Decrypt: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sat Mar 11 10:37:25 2017 daemon.notice openvpn[5368]: [fr15.nordvpn.com] Peer Connection Initiated with [AF_INET]185.94.189.172:443
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: SENT CONTROL [fr15.nordvpn.com]: ‘PUSH_REQUEST’ (status=1)
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: PUSH: Received control message: ‘PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.93 255.255.255.0,peer-id 0’
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: --sndbuf/–rcvbuf options modified
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: Socket Buffers: R=[341760->327680] S=[44800->327680]
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: route options modified
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: route-related options modified
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: peer-id set
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: OPTIONS IMPORT: adjusting link_mtu to 1639
Sat Mar 11 10:37:27 2017 daemon.notice netifd: Interface ‘VPN_client’ is enabled
Sat Mar 11 10:37:27 2017 daemon.notice netifd: Network device ‘tun0’ link is up
Sat Mar 11 10:37:27 2017 daemon.notice netifd: Interface ‘VPN_client’ has link connectivity
Sat Mar 11 10:37:27 2017 daemon.notice netifd: Interface ‘VPN_client’ is setting up now
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: TUN/TAP device tun0 opened
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: TUN/TAP TX queue length set to 100
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: /usr/sbin/ip link set dev tun0 up mtu 1500
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: /usr/sbin/ip addr add dev tun0 10.7.7.93/24 broadcast 10.7.7.255
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: /usr/sbin/ip route add 185.94.189.172/32 via 192.168.0.1
Sat Mar 11 10:37:27 2017 daemon.warn openvpn[5368]: ERROR: Linux route add command failed: external program exited with error status: 1
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: /usr/sbin/ip route add 0.0.0.0/1 via 10.7.7.1
Sat Mar 11 10:37:27 2017 daemon.notice netifd: Interface ‘VPN_client’ is now up
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: /usr/sbin/ip route add 128.0.0.0/1 via 10.7.7.1
Sat Mar 11 10:37:27 2017 daemon.notice openvpn[5368]: Initialization Sequence Completed
Sat Mar 11 10:37:28 2017 user.notice firewall: Reloading firewall due to ifup of VPN_client (tun0)
Sat Mar 11 10:38:00 2017 daemon.notice netifd: Network device ‘tun0’ link is down
Sat Mar 11 10:38:00 2017 daemon.notice netifd: Interface ‘VPN_client’ has link connectivity loss
Sat Mar 11 10:38:00 2017 daemon.notice netifd: Interface ‘VPN_client’ is now down
Sat Mar 11 10:38:00 2017 daemon.notice netifd: Interface ‘VPN_client’ is disabled
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5862]: OpenVPN 2.3.10 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6]
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5862]: library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
Sat Mar 11 10:38:01 2017 daemon.warn openvpn[5863]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5863]: NOTE: --fast-io is disabled since we are not using UDP
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5863]: Control Channel Authentication: tls-auth using INLINE static key file
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5863]: Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5863]: Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5863]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Sat Mar 11 10:38:01 2017 daemon.notice openvpn[5863]: Attempting to establish TCP connection with [AF_INET]94.247.28.98:443 [nonblock]
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: TCP connection established with [AF_INET]94.247.28.98:443
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: TCPv4_CLIENT link local: [undef]
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: TCPv4_CLIENT link remote: [AF_INET]94.247.28.98:443
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: TLS: Initial packet from [AF_INET]94.247.28.98:443, sid=de45b377 4aee3f08
Sat Mar 11 10:38:02 2017 daemon.warn openvpn[5863]: WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr9.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: Validating certificate key usage
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: ++ Certificate has key usage 00a0, expects 00a0
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: VERIFY KU OK
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: Validating certificate extended key usage
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: VERIFY EKU OK
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr9.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: Data Channel Encrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: Data Channel Encrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: Data Channel Decrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: Data Channel Decrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sat Mar 11 10:38:02 2017 daemon.notice openvpn[5863]: [fr9.nordvpn.com] Peer Connection Initiated with [AF_INET]94.247.28.98:443
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: SENT CONTROL [fr9.nordvpn.com]: ‘PUSH_REQUEST’ (status=1)
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: PUSH: Received control message: ‘PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.200 255.255.255.0,peer-id 0’
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: --sndbuf/–rcvbuf options modified
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: Socket Buffers: R=[341760->327680] S=[44800->327680]
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: route options modified
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: route-related options modified
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: peer-id set
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: OPTIONS IMPORT: adjusting link_mtu to 1595
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: TUN/TAP device tun0 opened
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: /usr/sbin/ip addr add dev tun0 10.7.7.200/24 broadcast 10.7.7.255
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: /usr/sbin/ip route add 94.247.28.98/32 via 192.168.0.1
Sat Mar 11 10:38:04 2017 daemon.notice netifd: Interface ‘VPN_client’ is enabled
Sat Mar 11 10:38:04 2017 daemon.notice netifd: Network device ‘tun0’ link is up
Sat Mar 11 10:38:04 2017 daemon.notice netifd: Interface ‘VPN_client’ has link connectivity
Sat Mar 11 10:38:04 2017 daemon.notice netifd: Interface ‘VPN_client’ is setting up now
Sat Mar 11 10:38:04 2017 daemon.notice netifd: Interface ‘VPN_client’ is now up
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: /usr/sbin/ip route add 0.0.0.0/1 via 10.7.7.1
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: /usr/sbin/ip route add 128.0.0.0/1 via 10.7.7.1
Sat Mar 11 10:38:04 2017 daemon.notice openvpn[5863]: Initialization Sequence Completed
Sat Mar 11 10:38:05 2017 user.notice firewall: Reloading firewall due to ifup of VPN_client (tun0)
Sat Mar 11 10:38:09 2017 daemon.notice netifd: Network device ‘tun0’ link is down
Sat Mar 11 10:38:09 2017 daemon.notice netifd: Interface ‘VPN_client’ has link connectivity loss
Sat Mar 11 10:38:09 2017 daemon.notice netifd: Interface ‘VPN_client’ is now down
Sat Mar 11 10:38:09 2017 daemon.notice netifd: Interface ‘VPN_client’ is disabled
Sat Mar 11 10:44:20 2017 daemon.info hostapd: wlan0: STA 00:13:e8:1d:87:03 WPA: group key handshake completed (RSN)
Sat Mar 11 10:44:20 2017 daemon.info hostapd: wlan0: STA d0:e1:40:c5:b0:65 WPA: group key handshake completed (RSN)
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9111]: OpenVPN 2.3.10 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6]
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9111]: library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
Sat Mar 11 10:48:39 2017 daemon.warn openvpn[9112]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9112]: NOTE: --fast-io is disabled since we are not using UDP
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9112]: Control Channel Authentication: tls-auth using INLINE static key file
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9112]: Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9112]: Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9112]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Sat Mar 11 10:48:39 2017 daemon.notice openvpn[9112]: Attempting to establish TCP connection with [AF_INET]94.247.28.98:443 [nonblock]
Sat Mar 11 10:48:40 2017 daemon.notice openvpn[9112]: TCP connection established with [AF_INET]94.247.28.98:443
Sat Mar 11 10:48:40 2017 daemon.notice openvpn[9112]: TCPv4_CLIENT link local: [undef]
Sat Mar 11 10:48:40 2017 daemon.notice openvpn[9112]: TCPv4_CLIENT link remote: [AF_INET]94.247.28.98:443
Sat Mar 11 10:48:40 2017 daemon.notice openvpn[9112]: TLS: Initial packet from [AF_INET]94.247.28.98:443, sid=44d615da 05c14154
Sat Mar 11 10:48:40 2017 daemon.warn openvpn[9112]: WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr9.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: Validating certificate key usage
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: ++ Certificate has key usage 00a0, expects 00a0
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: VERIFY KU OK
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: Validating certificate extended key usage
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: VERIFY EKU OK
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr9.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: Data Channel Encrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: Data Channel Encrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: Data Channel Decrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: Data Channel Decrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sat Mar 11 10:48:41 2017 daemon.notice openvpn[9112]: [fr9.nordvpn.com] Peer Connection Initiated with [AF_INET]94.247.28.98:443
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: SENT CONTROL [fr9.nordvpn.com]: ‘PUSH_REQUEST’ (status=1)
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: PUSH: Received control message: ‘PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.200 255.255.255.0,peer-id 0’
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: --sndbuf/–rcvbuf options modified
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: Socket Buffers: R=[341760->327680] S=[44800->327680]
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: route options modified
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: route-related options modified
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: peer-id set
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: OPTIONS IMPORT: adjusting link_mtu to 1595
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: TUN/TAP device tun0 opened
Sat Mar 11 10:48:43 2017 daemon.notice netifd: Interface ‘VPN_client’ is enabled
Sat Mar 11 10:48:43 2017 daemon.notice netifd: Network device ‘tun0’ link is up
Sat Mar 11 10:48:43 2017 daemon.notice netifd: Interface ‘VPN_client’ has link connectivity
Sat Mar 11 10:48:43 2017 daemon.notice netifd: Interface ‘VPN_client’ is setting up now
Sat Mar 11 10:48:43 2017 daemon.notice netifd: Interface ‘VPN_client’ is now up
Sat Mar 11 10:48:43 2017 daemon.warn openvpn[9112]: ERROR: Linux route add command failed: external program exited with error status: 1
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: /usr/sbin/ip route add 0.0.0.0/1 via 10.7.7.1
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: /usr/sbin/ip route add 128.0.0.0/1 via 10.7.7.1
Sat Mar 11 10:48:43 2017 daemon.notice openvpn[9112]: Initialization Sequence Completed
Sat Mar 11 10:48:43 2017 user.notice firewall: Reloading firewall due to ifup of VPN_client (tun0)
Sat Mar 11 10:54:20 2017 daemon.info hostapd: wlan0: STA 00:13:e8:1d:87:03 WPA: group key handshake completed (RSN)
Sat Mar 11 10:54:20 2017 daemon.info hostapd: wlan0: STA d0:e1:40:c5:b0:65 WPA: group key handshake completed (RSN)
Sat Mar 11 10:59:34 2017 daemon.notice netifd: Network device ‘tun0’ link is down
Sat Mar 11 10:59:34 2017 daemon.notice netifd: Interface ‘VPN_client’ has link connectivity loss
Sat Mar 11 10:59:34 2017 daemon.notice netifd: Interface ‘VPN_client’ is now down
Sat Mar 11 10:59:34 2017 daemon.notice netifd: Interface ‘VPN_client’ is disabled