VLAN's create isolated broadcast domains, unless openvpn interface has been tagged with the correct vlan tag, then traffic from openvpn will not be able to communicate with the machines on the vlan, even if they have the same subnet/range.
I would suggest on the openvpn server you enable ip forwarding for the openvpn interface, and the local interface outbound traffic will use.
run the following commands with sudo as in a root shell.
sysctl net.ipv4.conf.eth1.forwarding=1
sysctl net.ipv4.conf.tun0.forwarding=1
replace tun0 for the names of your openvpn tunnel interfaces if it is not tun0, it may be tap0 or similar. You will also need to run the command for any additional interfaces you want traffic to be forwarded on.
You can run sysctl net.ipv4.conf.all.forwarding=1
but this can create security issues, so please check with the relevant people, and do your checks before enabling. Sometimes, quick is not best.
once you confirmed this works, you can update /etc/sysctl.conf with:
net.ipv4.conf.eth1.forwarding=1
net.ipv4.conf.openvpn.forwarding=1
You will need to set the gateway for your pc to be the ip address of the openvpn endpoint. and then run:
iptables -A INPUT -i tun+ -j ACCEPT
iptables -A FORWARD -i tun+ -o eth+ -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -i tun+ -o as0t+ -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -i eth+ -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i as0t+ -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -t nat -A POSTROUTING -s 10.0.127.0/24 -o eth+ -j MASQUERADE
iptables -t nat -A POSTROUTING -s 10.0.127.0/24 -o as0t+ -j MASQUERADE
This will nat any connections from your client, and use the servers local interface (that is able to access all the machines) to forward traffic to the other machines.
To avoid having to add these rules after each reboot, install iptables-persistent via apt. iptables-persistent will save your rules, and on each reboot, reapply the rules.
Using the extra info you provided with the subnets, instead of setting the default gateway on your pc, you can modify your openvpn config to push the routes to your pc. Add the following lines anywhere in your config file, I would recommend just below the line where you set the ip near the top of the file.
push "route 10.0.16.0 255.255.255.0" #note this is /24 subnet, not 32 as you mentioned. a /32 is a host address written in CIDR format.
push "route 172.x.x.x 255.x.x.x"
push "route 172.x.x.x 255.x.x.x"
push "route 178.x.x.x 255.x.x.x"
push "route 192.168.x.x 255.255.x.x"
The option in linode "listen on all interfaces" controls what interfaces openvpn listens on for the inital connection. Once the vpn connection has been established, that option has 0 effect on the performance of the vpn.