192.168.10.0-192.168.10.10, every port: allow (should be the IPs of the clients connected to the VPN).
192.168.10.1 not .0
I’m sure it’s a typo, because you can’t have .0 (Just to highlight it for anyone interested in this thread). However, if you’re not allowing access to the LAN, you don’t need this rule in the firewall.
The only thing I have noticed is openVPN who complain about a lack of certificate.
On my iPad and iPhone, the OpenVPN client doesn’t complain and I’m not using any certificates. Check the settings on your client to see if there’s an option to shut it up. If you’re feeling adventurous, try installing certificates
Is everything else ok? By using the VPN, can I still use the Windows network drive (the drive Z: ) while I'm outside my home?
Sorry, I don’t know much about Windows. That’s why I have a warning next to my username– a Mac/iOS user
However, if it connects while you’re on your LAN, it should connect while on the VPN. Just mind the VPN’s dynamic IP addresses. I’m guessing, if you enable “Allow LAN access”, it’ll work without any changes because it’ll use your DS’ LAN IP address (as highlighted by the referenced resource under “important” at the very end). It’s like if the traffic goes out of the DS and comes back through the LAN’s subnet.
BTW, I use http (not https) when connecting over OpenVPN for things like Video Station or if I’m on a slow WAN link. Since traffic is already encrypted with the VPN connection removing the extra encryption layer of https gives it a speed boost (should make a difference).