OpenVPN not Routing correctly on CentOS 6

centos6openvpnrouting

I am trying to set up OpenVPN 2.2.1 on my CentOS 6.2 VPS. This is my first time setting up, and everything went smoothly. The service is running, and the client is able to connect. My intention is to forward all my traffic from the client, to my VPS, to the internet. However, I am met with a problem.

When pinging the VPS IP, everything works fine. However, when pinging ANY other IP/name server on the internet, it refuses to connect.

I have spent the past 5 hours reading threads and looking for solutions, but none of them applied to me. The nature of the problem has led me to believe that it is an issue with the traffic not being routed correctly.

OpenVPN Server Config:

local 5.34.244.*** (asterisks applied for privacy)
port 443
proto tcp
dev tun
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
ca /etc/openvpn/easy-rsa/2.0/keys/ca.crt
cert /etc/openvpn/easy-rsa/2.0/keys/server.crt
key /etc/openvpn/easy-rsa/2.0/keys/server.key
dh /etc/openvpn/easy-rsa/2.0/keys/dh1024.pem
plugin /usr/share/openvpn/plugin/lib/openvpn-auth-pam.so /etc/pam.d/login
client-cert-not-required
username-as-common-name
server 1.2.4.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "redirect-gateway def1"
push "dhcp-option DNS 208.67.222.222"
push "dhcp-option DNS 4.2.2.1"
keepalive 5 30
comp-lzo
persist-key
persist-tun
status server-tcp.log
verb 3

OpenVPN Client Config:

client
dev tun
proto tcp
remote 5.34.244.*** 443
resolv-retry infinite
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ca ca.crt
cert sample.crt
key sample.key
comp-lzo
verb 3
route-method exe
route-delay 2

IPtables:

# iptables -L -t nat -v
Chain PREROUTING (policy ACCEPT 6706 packets, 397K bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain POSTROUTING (policy ACCEPT 6406 packets, 377K bytes)
 pkts bytes target     prot opt in     out     source               destination
 2386  145K SNAT       all  --  any    any     1.2.4.0/24           anywhere            

to:5.34.244.***
    0     0 SNAT       all  --  any    any     1.2.4.0/24           anywhere            

to:5.34.244.***
    0     0 MASQUERADE  all  --  any    eth0    1.2.4.0/24           anywhere

Chain OUTPUT (policy ACCEPT 5270 packets, 312K bytes)
 pkts bytes target     prot opt in     out     source               destination

and

# iptables -L -v
Chain INPUT (policy ACCEPT 1377 packets, 415K bytes)
 pkts bytes target     prot opt in     out     source               destination
    4   216 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp 

dpt:87
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp 

dpt:87
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp 

dpt:87
    1    60 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp 

dpt:87
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp 

dpt:87
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp 

dpt:87
    0     0 ACCEPT     all  --  tun0   any     anywhere             anywhere

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  tun0   any     anywhere             anywhere

Chain OUTPUT (policy ACCEPT 140K packets, 3823K bytes)
 pkts bytes target     prot opt in     out     source               destination

In my sysctl.conf file, I've enabled IP forwarding:

net.ipv4.ip_forward = 1

I tried posting on the OpenVPN forums for support, but my thread got mysteriously deleted. Any help would be appreciated.

Edit:
Adding reoccurring log entry from /var/log/messages (asterisks added for privacy):

Aug 11 03:53:27 vps openvpn[28055]: mac/**.233.229.93:50840 Need IPv6 code in mroute_extract_addr_from_packet

Edit:
Adding requested info:

# sysctl -p
net.ipv4.ip_forward = 1
net.ipv4.tcp_syncookies = 1
error: "net.bridge.bridge-nf-call-ip6tables" is an unknown key
error: "net.bridge.bridge-nf-call-iptables" is an unknown key
error: "net.bridge.bridge-nf-call-arptables" is an unknown key

# cat /proc/sys/net/ipv4/ip_forward
1

# tcpdump -i tun0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tun0, link-type RAW (Raw IP), capture size 65535 bytes
05:24:30.574250 IP resolver1.opendns.com.domain > 1.2.4.6.62511: 20077 2/0/0 CNAME teredo.ipv6.microsoft.com.ns
atc.net., A 94.245.121.253 (108)
05:24:32.328193 IP a.resolvers.level3.net.domain > 1.2.4.6.62511: 20077 2/0/0 CNAME teredo.ipv6.microsoft.com.n
satc.net., A 65.55.158.118 (108)
05:24:34.027459 IP google-public-dns-a.google.com > 1.2.4.6: ICMP echo reply, id 1, seq 1242, length 40
05:24:37.848645 IP google-public-dns-a.google.com > 1.2.4.6: ICMP echo reply, id 1, seq 1243, length 40
05:24:38.729543 IP 63-225-240-44.hlrn.qwest.net.30160 > 1.2.4.6.51958: Flags [S.], seq 784307014, ack 187668555
9, win 14600, options [mss 1452,nop,nop,sackOK,nop,wscale 4], length 0
05:24:39.132105 IP 63-225-240-44.hlrn.qwest.net.30160 > 1.2.4.6.51960: Flags [S.], seq 3810646056, ack 33965940
38, win 14600, options [mss 1452,nop,nop,sackOK,nop,wscale 4], length 0
05:24:42.866762 IP google-public-dns-a.google.com > 1.2.4.6: ICMP echo reply, id 1, seq 1244, length 40
05:24:48.065918 IP google-public-dns-a.google.com > 1.2.4.6: ICMP echo reply, id 1, seq 1245, length 40
05:24:58.234720 IP google-public-dns-a.google.com > 1.2.4.6: ICMP echo reply, id 1, seq 1247, length 40
05:25:02.852886 IP google-public-dns-a.google.com > 1.2.4.6: ICMP echo reply, id 1, seq 1248, length 40

10 packets captured
10 packets received by filter

Client side log (asterisks for privacy):

Sat Aug 11 02:53:46 2012 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Sat Aug 11 02:53:50 2012 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Sat Aug 11 02:53:50 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Sat Aug 11 02:53:50 2012 LZO compression initialized
Sat Aug 11 02:53:50 2012 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:0 ]
Sat Aug 11 02:53:50 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Aug 11 02:53:50 2012 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
Sat Aug 11 02:53:50 2012 Local Options hash (VER=V4): '2547efd2'
Sat Aug 11 02:53:50 2012 Expected Remote Options hash (VER=V4): '77cf0943'
Sat Aug 11 02:53:50 2012 Attempting to establish TCP connection with 5.34.244.***:443
Sat Aug 11 02:53:51 2012 TCP connection established with 5.34.244.***:443
Sat Aug 11 02:53:51 2012 TCPv4_CLIENT link local: [undef]
Sat Aug 11 02:53:51 2012 TCPv4_CLIENT link remote: 5.34.244.***:443
Sat Aug 11 02:53:51 2012 TLS: Initial packet from 5.34.244.***:443, sid=41dd99fd d7cc097e
Sat Aug 11 02:53:51 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Aug 11 02:53:54 2012 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=macvpn/name=changeme/emailAddress=mail@host.domain
Sat Aug 11 02:53:54 2012 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=Build_Diffie_Hellman/name=changeme/emailAddress=mail@host.domain
Sat Aug 11 02:53:56 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Aug 11 02:53:56 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Aug 11 02:53:56 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Aug 11 02:53:56 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Aug 11 02:53:56 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Aug 11 02:53:56 2012 [Build_Diffie_Hellman] Peer Connection Initiated with 5.34.244.***:443
Sat Aug 11 02:53:58 2012 SENT CONTROL [Build_Diffie_Hellman]: 'PUSH_REQUEST' (status=1)
Sat Aug 11 02:53:59 2012 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 208.67.222.222,dhcp-option DNS 4.2.2.1,route 1.2.4.1,topology net30,ping 5,ping-restart 30,ifconfig 1.2.4.6 1.2.4.5'
Sat Aug 11 02:53:59 2012 OPTIONS IMPORT: timers and/or timeouts modified
Sat Aug 11 02:53:59 2012 OPTIONS IMPORT: --ifconfig/up options modified
Sat Aug 11 02:53:59 2012 OPTIONS IMPORT: route options modified
Sat Aug 11 02:53:59 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Aug 11 02:53:59 2012 ROUTE default_gateway=192.168.1.1
Sat Aug 11 02:53:59 2012 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{3A817AE1-696B-4DEB-BD4F-8BE01F11FC47}.tap
Sat Aug 11 02:53:59 2012 TAP-Win32 Driver Version 9.9 
Sat Aug 11 02:53:59 2012 TAP-Win32 MTU=1500
Sat Aug 11 02:53:59 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 1.2.4.6/255.255.255.252 on interface {3A817AE1-696B-4DEB-BD4F-8BE01F11FC47} [DHCP-serv: 1.2.4.5, lease-time: 31536000]
Sat Aug 11 02:53:59 2012 Successful ARP Flush on interface [25] {3A817AE1-696B-4DEB-BD4F-8BE01F11FC47}
Sat Aug 11 02:54:01 2012 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Sat Aug 11 02:54:01 2012 C:\WINDOWS\system32\route.exe ADD 5.34.244.*** MASK 255.255.255.255 192.168.1.1
 OK!
Sat Aug 11 02:54:01 2012 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 1.2.4.5
 OK!
Sat Aug 11 02:54:01 2012 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 1.2.4.5
 OK!
Sat Aug 11 02:54:01 2012 C:\WINDOWS\system32\route.exe ADD 1.2.4.1 MASK 255.255.255.255 1.2.4.5
 OK!
Sat Aug 11 02:54:01 2012 Initialization Sequence Completed
Sat Aug 11 03:53:56 2012 TLS: soft reset sec=0 bytes=429941/0 pkts=4470/0
Sat Aug 11 03:54:00 2012 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=macvpn/name=changeme/emailAddress=mail@host.domain
Sat Aug 11 03:54:00 2012 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=Build_Diffie_Hellman/name=changeme/emailAddress=mail@host.domain
Sat Aug 11 03:54:02 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Aug 11 03:54:02 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Aug 11 03:54:02 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Aug 11 03:54:02 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Aug 11 03:54:02 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Aug 11 04:34:50 2012 TCP/UDP: Closing socket
Sat Aug 11 04:34:50 2012 C:\WINDOWS\system32\route.exe DELETE 1.2.4.1 MASK 255.255.255.255 1.2.4.5
 OK!
Sat Aug 11 04:34:50 2012 C:\WINDOWS\system32\route.exe DELETE 5.34.244.*** MASK 255.255.255.255 192.168.1.1
 OK!
Sat Aug 11 04:34:50 2012 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 1.2.4.5
 OK!
Sat Aug 11 04:34:50 2012 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 1.2.4.5
 OK!
Sat Aug 11 04:34:50 2012 Closing TUN/TAP interface
Sat Aug 11 04:34:50 2012 SIGTERM[hard,] received, process exiting
Sat Aug 11 04:39:00 2012 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Sat Aug 11 04:39:07 2012 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Sat Aug 11 04:39:07 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Sat Aug 11 04:39:07 2012 LZO compression initialized
Sat Aug 11 04:39:07 2012 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:0 ]
Sat Aug 11 04:39:07 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Aug 11 04:39:07 2012 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
Sat Aug 11 04:39:07 2012 Local Options hash (VER=V4): '2547efd2'
Sat Aug 11 04:39:07 2012 Expected Remote Options hash (VER=V4): '77cf0943'
Sat Aug 11 04:39:07 2012 Attempting to establish TCP connection with 5.34.244.***:443
Sat Aug 11 04:39:08 2012 TCP connection established with 5.34.244.***:443
Sat Aug 11 04:39:08 2012 TCPv4_CLIENT link local: [undef]
Sat Aug 11 04:39:08 2012 TCPv4_CLIENT link remote: 5.34.244.***:443
Sat Aug 11 04:39:08 2012 TLS: Initial packet from 5.34.244.***:443, sid=c86d779b e406746d
Sat Aug 11 04:39:08 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Aug 11 04:39:12 2012 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=macvpn/name=changeme/emailAddress=mail@host.domain
Sat Aug 11 04:39:12 2012 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=Build_Diffie_Hellman/name=changeme/emailAddress=mail@host.domain
Sat Aug 11 04:39:14 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Aug 11 04:39:14 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Aug 11 04:39:14 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Aug 11 04:39:14 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Aug 11 04:39:14 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Aug 11 04:39:14 2012 [Build_Diffie_Hellman] Peer Connection Initiated with 5.34.244.***:443
Sat Aug 11 04:39:16 2012 SENT CONTROL [Build_Diffie_Hellman]: 'PUSH_REQUEST' (status=1)
Sat Aug 11 04:39:16 2012 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 208.67.222.222,dhcp-option DNS 4.2.2.1,route 1.2.4.1,topology net30,ping 5,ping-restart 30,ifconfig 1.2.4.6 1.2.4.5'
Sat Aug 11 04:39:16 2012 OPTIONS IMPORT: timers and/or timeouts modified
Sat Aug 11 04:39:16 2012 OPTIONS IMPORT: --ifconfig/up options modified
Sat Aug 11 04:39:16 2012 OPTIONS IMPORT: route options modified
Sat Aug 11 04:39:16 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Aug 11 04:39:16 2012 ROUTE default_gateway=192.168.1.1
Sat Aug 11 04:39:16 2012 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{3A817AE1-696B-4DEB-BD4F-8BE01F11FC47}.tap
Sat Aug 11 04:39:16 2012 TAP-Win32 Driver Version 9.9 
Sat Aug 11 04:39:16 2012 TAP-Win32 MTU=1500
Sat Aug 11 04:39:16 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 1.2.4.6/255.255.255.252 on interface {3A817AE1-696B-4DEB-BD4F-8BE01F11FC47} [DHCP-serv: 1.2.4.5, lease-time: 31536000]
Sat Aug 11 04:39:16 2012 Successful ARP Flush on interface [25] {3A817AE1-696B-4DEB-BD4F-8BE01F11FC47}
Sat Aug 11 04:39:18 2012 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Sat Aug 11 04:39:18 2012 C:\WINDOWS\system32\route.exe ADD 5.34.244.*** MASK 255.255.255.255 192.168.1.1
 OK!
Sat Aug 11 04:39:18 2012 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 1.2.4.5
 OK!
Sat Aug 11 04:39:18 2012 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 1.2.4.5
 OK!
Sat Aug 11 04:39:18 2012 C:\WINDOWS\system32\route.exe ADD 1.2.4.1 MASK 255.255.255.255 1.2.4.5
 OK!
Sat Aug 11 04:39:18 2012 Initialization Sequence Completed

ipconfig:

Windows IP Configuration


Ethernet adapter Local Area Connection 2:

   Connection-specific DNS Suffix  . : 
   Link-local IPv6 Address . . . . . : fe80::7590:fe5e:9de3:cb2d%25
   IPv4 Address. . . . . . . . . . . : 1.2.4.6
   Subnet Mask . . . . . . . . . . . : 255.255.255.252
   Default Gateway . . . . . . . . . : 

Wireless LAN adapter Wireless Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : WAG320N

Ethernet adapter Local Area Connection:

   Connection-specific DNS Suffix  . : WAG320N
   Link-local IPv6 Address . . . . . : fe80::607e:9cac:93a7:78d5%11
   IPv4 Address. . . . . . . . . . . : 192.168.1.100
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.1.1

Tunnel adapter Teredo Tunneling Pseudo-Interface:

   Connection-specific DNS Suffix  . : 
   IPv6 Address. . . . . . . . . . . : 2001:0:5ef5:79fb:3466:31c3:fefd:fbf9
   Link-local IPv6 Address . . . . . : fe80::3466:31c3:fefd:fbf9%13
   Default Gateway . . . . . . . . . : 

Tunnel adapter isatap.WAG320N:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 

Tunnel adapter isatap.{3A817AE1-696B-4DEB-BD4F-8BE01F11FC47}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 

Tunnel adapter 6TO4 Adapter:

   Connection-specific DNS Suffix  . : 
   IPv6 Address. . . . . . . . . . . : 2002:102:406::102:406
   Default Gateway . . . . . . . . . : 2002:c058:6301::c058:6301

Tunnel adapter isatap.{ADF8B671-A3A2-4908-B5D0-4150F860DCDB}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : WAG320N

route print (asterisks for privacy):

===========================================================================
Interface List
 25...00 ff 3a 81 7a e1 ......TAP-Win32 Adapter V9
 12...00 13 e8 4b 12 61 ......Intel(R) Wireless WiFi Link 4965AGN
 11...00 1b 38 18 41 aa ......Realtek RTL8101E Family PCI-E Fast Ethernet NIC (NDIS 6.20)
  1...........................Software Loopback Interface 1
 13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
 15...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
 16...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
 28...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1    192.168.1.104     20
          0.0.0.0        128.0.0.0          1.2.4.5          1.2.4.6     31
          1.2.4.1  255.255.255.255          1.2.4.5          1.2.4.6     31
          1.2.4.4  255.255.255.252         On-link           1.2.4.6    286
          1.2.4.6  255.255.255.255         On-link           1.2.4.6    286
          1.2.4.7  255.255.255.255         On-link           1.2.4.6    286
     5.34.244.***  255.255.255.255      192.168.1.1    192.168.1.104     21
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
        128.0.0.0        128.0.0.0          1.2.4.5          1.2.4.6     31
      192.168.1.0    255.255.255.0         On-link     192.168.1.104    276
    192.168.1.104  255.255.255.255         On-link     192.168.1.104    276
    192.168.1.255  255.255.255.255         On-link     192.168.1.104    276
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link     192.168.1.104    276
        224.0.0.0        240.0.0.0         On-link           1.2.4.6    286
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link     192.168.1.104    276
  255.255.255.255  255.255.255.255         On-link           1.2.4.6    286
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 28   1140 ::/0                     2002:c058:6301::c058:6301
  1    306 ::1/128                  On-link
 28   1040 2002::/16                On-link
 28    296 2002:102:406::102:406/128
                                    On-link
 11    276 fe80::/64                On-link
 25    286 fe80::/64                On-link
 11    276 fe80::607e:9cac:93a7:78d5/128
                                    On-link
 25    286 fe80::7590:fe5e:9de3:cb2d/128
                                    On-link
  1    306 ff00::/8                 On-link
 11    276 ff00::/8                 On-link
 25    286 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

UPDATE: Something strange happened. Some background first:
I use Skype to transfer files from the client machine to the machine I am using now to troubleshoot. I usually disconnect from the VPN first (with the assumption that it's not working), however, while sending the .txt files over to the troubleshooting machine for a recent request, I realized that it was working while being connected to the VPN. To make sure this wasn't a fluke, I resent a larger file, and surely enough the IP I was receiving from matched that of the VPN. This has somewhat given me hope that not all is lost. Hopefully this will shed some light on the solution to this problem.

What I can do:
Send files over Skype while connected to the VPN, only if Skype was already logged into before the connection the VPN was established.

What I **cannot* do:
Login/connect to Skype using the VPN.

Best Answer

Alright guys, having some technical difficulties with my account atm, will be resolved soon hopefully. However, BIG update:

I am now able to ping/tracert to 1.2.4.1

I realized that the first rule in IPtables POSTROUTING was wrongly configured, so I removed it and re-added it. Everything is working as it should now! Thanks you all for your help, I would have never come across the solution without it.

@cjc @Alex @Kilo