Basha,
Forgive me, but I really don' t want to go though teh document.
In my experience with CP and Fortigate, you need to do some debugging to find outr where the problem is.
You should be getting error logs eithr on the checkpoint or the Fortigate.
If you are trying to bring up the tunnel from teh FG, then the error will appeer on the CP and vice versa.
A firewall Virtual IP pool, is used to so that traffic leaving the fortigate seems to come from teh IP address configured in the pool. If your actual address range is what is configured in your phase 2 then you don' t need it.
A firewall Virtual IP address is used to allow traffic coming back down teh tunnel to be directed to a single address, again if your networks do not overlap with each other and are correctly specified in the Phase 2 teh you don' t need this.
Configure incoming firewall policy is required to let the tunnel come up. So allow teh traffic from teh remote site into the network you wish.
ALso in my experience, the CP is normally unhappy because it is expecting to NAT on th einterface of the outside interface. Try to check your address translation rules on CP, ther should be an exempt set of subnets for VPNs
Still learning to type " the"