I don't think that is the same from what I read here, but you should be able to understand well what packets are on FortiGate on which interface when you understand the integrated CLI sniffer well:
diag sniff packet any 'icmp' 4 0 a
Shows ICMP packets, decodes them, shows the interface and direction where the packet is seen (4), writes unlimited amount (0) and adds the (a)bsolute timestamp to it.
Runs on FortiGate, FortiSwitch, FortiAnalyzer, FortiManager and FortiMail. Probably more.
2023-03-21 09:48:15.461364 internal1 in 192.168.111.2 -> 18.104.22.168: icmp: echo request
2023-03-21 09:48:15.461459 wan1 out 22.214.171.124 -> 126.96.36.199: icmp: echo request
2023-03-21 09:48:15.493149 wan1 in 188.8.131.52 -> 184.108.40.206: icmp: echo reply
2023-03-21 09:48:15.493176 internal1 out 220.127.116.11 -> 192.168.111.2: icmp: echo reply