You have to put "Remote Networks" in the server settings. That is what creates the FreeBSD route into the OpenVPN instance. This is the OpenVPN route directive.
Then, in the CSOs, you put the actual remote site networks. These must be contained within the server route above. This creates the OpenVPN iroute directives which tell OpenVPN what to do with the traffic when it gets it - as in what client to send it to.
So in the example given, server local networks would be 192.168.11.0/24, 192.168.12.0/24, 192.168.13.0/24, server remote networks could be 192.168.1.0/24, and the CSOs would contain the /26 for each client in the IPv4 Remote Networks there.
I would probably opt for something more like:
Server remote network: 172.29.160.0/19
CSOs: 172.29.160.0/24, 172.29.161.0/24, 172.29.162.0/24, etc
Or even: 172.29.160.0/22, 172.29.164.0/22, 172.29.168.0/22, 172.29.172.0/22 so each site has 4 /24 subnets to do with as they see fit without changes to the VPN. The /19 would allow growth to 8 branches of 4 /24s each, while the address "collision" possibility with other sites would be limited to 172.29.160.0/19.
You should probably use Peer to Peer (SSL/TLS) mode for the server for this.