As per the sniffer logs, we can see the "in" traffic on Port1 from source 10.10.100.1 but no "out" traffic, and as per the flow filter route lookup is happening and for every packet from 192.168.100.1 new session is allocating so it seems the traffic is getting denied due to some reason, To verify it we will need to collect the flow filter with iprope.
please take the below debug and share the output
diag debug disable diag debug reset diag debug flow filter clear diag debug flow filter saddr x.x.x.x diag debug flow filter daddr 220.127.116.11 diag debug flow filter proto 1 diag debug flow show iprop en diag debug flow show fun en diag debug flow trace start 1000 diag debug enable
Here x.x.x.x is the source machine IP, once the flow filter is in place initiate the ping from the machine to 18.104.22.168, collect the output and share.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.