Some of this won't make a difference, but won't hurt and might help.
This has nothing to do with it, but generally UDP is better than TCP for openvpn.
Try "Force all traffic generated through the tunnel"
compress tunnel packets
Set TOS IP header value of tunnel packets to match the encapsulated packets
Provide a default domain name to clients. Call it something like openvpndom1
Provide NTP Server list to clients - You can get some IPs for them on the web from NTP.ORG
I assume the interface pfsense GUI falls within 10.100.0.0/16?
Now - I see you have "WAN1" listed as interface. This means you have multiple WANS?
If so, you might need manual outbound NAT and set outbound routing by interface.
If you have packets coming in on 1 interface and trying to leave on another, that would break things.
(I'm actually a little in the dark on that because it seems hit and miss. There is one pfsense running that I admin from time to time with 5 IPs, 5 WANs and no manual outbound NAT and it works just fine with openvpn. Maybe because it only has 1 gateway?)