Well the Client side looks essentially correct, but without seeing the server side, it's hard to tell.
One further note, it wasn't clear which LAN's belong to the client and which to the server -
Client LAN (pfSense side) - 192.168.0.0/24 ?
Server LAN (FLI4L side) - 192.168.100.0/24 ?
The main firewall rule for pfsense is to allow all under the OpenVPN interface.
I have never seen the FLI4L configurations for OpenVPN (or anything else) but the things to look for would be the network routed over the tunnel. You might want to check the routing tables on bith the pfSense and the FLI4L side after the tunnel is established. The other place to look is the logs under OpenVPN. Again I don't know what FLI4L provides, but adding a "verb 5" or even a "verb 7" to the "Advanced Configuration" section of the OpenVPN config(s) should log tons of info about the established tunnel (turn it off after you get the tunnel working).
Just as an aside, why are you using FLI4L on the server side? From my (very) cursory look at FLI4L it seems to be a lightweight equivalent to pfSense. Any reason not to instal pfSense on the server side? (not requiring, just asking)