As requested here is the sniffer, IP-A is public IP for Fortigate, IP-B is public for TP-LINK, as you can notice there is an IP that is not hidden due to being a Microsoft IP in the city of redmond, and it is not a known IP to our company. Why is it going there?
CXRFTG # diag sniffer packet any ' icmp' 4
interfaces=[any]
filters=[icmp]
8.632593 internal in 192.168.3.23 -> 192.168.4.100: icmp: echo request
8.632846 Castellana out 192.168.3.23 -> 192.168.4.100: icmp: echo request
8.632917 wan1 out 192.168.3.23 -> 192.168.4.100: icmp: echo request
id=13 trace_id=1097 msg=" vd-root received a packet(proto=1, 192.168.3.23:1->192.168.4.100:8) from internal."
id=13 trace_id=1097 msg=" allocate a new session-00bc1cda"
id=13 trace_id=1097 msg=" find a route: gw-192.168.4.100 via Castellana"
id=13 trace_id=1097 msg=" use addr/intf hash, len=4"
id=13 trace_id=1097 msg=" Allowed by Policy-9:"
id=13 trace_id=1097 msg=" enter IPsec interface-Castellana"
id=13 trace_id=1097 msg=" send to IP-B via intf-wan1"
id=13 trace_id=1097 msg=" encrypting, and send to IP-B with source IP-A"
13.615912 internal in 192.168.3.23 -> 192.168.4.100: icmp: echo request
13.616062 Castellana out 192.168.3.23 -> 192.168.4.100: icmp: echo request
13.616120 wan1 out 192.168.3.23 -> 192.168.4.100: icmp: echo request
id=13 trace_id=1098 msg=" vd-root received a packet(proto=1, 192.168.3.23:1->192.168.4.100:8) from internal."
id=13 trace_id=1098 msg=" Find an existing session, id-00bc1cda, original direction"
id=13 trace_id=1098 msg=" enter IPsec interface-Castellana"
id=13 trace_id=1098 msg=" send to IP-B via intf-wan1"
id=13 trace_id=1098 msg=" encrypting, and send to IP-B with source IP-A"
15.061582 wan1 out IP-A -> 65.52.237.45: icmp: host IP-A unreachable
15.061637 wan1 out IP-A -> 65.52.237.45: icmp: host IP-A unreachable
15.061675 wan1 out IP-A -> 65.52.237.45: icmp: host IP-A unreachable