It looks like it is routing, I ran the diag on both ends and sent ping from the spoke to hub and got following output:
Output on Spoke:
FG-FireSTN2 # id=65308 trace_id=5 func=print_pkt_detail line=5779 msg=“vd-root:0 received a packet(proto=1, 192.168.16.100:1->192.168.0.8:2048) tun_id=0.0.0.0 from lan. type=8, code=0, id=1, seq=52.”
id=65308 trace_id=5 func=init_ip_session_common line=5964 msg=“allocate a new session-00013569, tun_id=0.0.0.0”
id=65308 trace_id=5 func=vf_ip_route_input_common line=2605 msg=“find a route: flag=04000000 gw-131.226.49.43 via FireStn2_Spoke1”
id=65308 trace_id=5 func=__iprope_tree_check line=528 msg=“gnum-100004, use int hash, slot=41, len=2”
id=65308 trace_id=5 func=fw_forward_handler line=990 msg=“Allowed by Policy-4:”
id=65308 trace_id=5 func=ipsecdev_hard_start_xmit line=669 msg=“enter IPSec interface FireStn2_Spoke1, tun_id=0.0.0.0”
id=65308 trace_id=5 func=_do_ipsecdev_hard_start_xmit line=229 msg=“output to IPSec tunnel FireStn2_Spoke1 vrf 0”
id=65308 trace_id=5 func=esp_output4 line=895 msg=“IPsec encrypt/auth”
id=65308 trace_id=5 func=ipsec_output_finish line=629 msg=“send to 172.16.30.1 via intf-wan”
id=65308 trace_id=6 func=print_pkt_detail line=5779 msg=“vd-root:0 received a packet(proto=1, 192.168.16.100:1->192.168.0.8:2048) tun_id=0.0.0.0 from lan. type=8, code=0, id=1, seq=53.”
id=65308 trace_id=6 func=resolve_ip_tuple_fast line=5867 msg=“Find an existing session, id-00013569, original direction”
id=65308 trace_id=6 func=npu_handle_session44 line=1199 msg=“Trying to offloading session from lan to FireStn2_Spoke1, skb.npu_flag=00000400 ses.state=00010200 ses.npu_state=0x05040000”
id=65308 trace_id=6 func=ip_session_install_npu_session line=358 msg=“npu session installation succeeded”
id=65308 trace_id=6 func=fw_forward_dirty_handler line=436 msg=“state=00010200, state2=00000000, npu_state=05000400”
id=65308 trace_id=6 func=ipsecdev_hard_start_xmit line=669 msg=“enter IPSec interface FireStn2_Spoke1, tun_id=0.0.0.0”
id=65308 trace_id=6 func=_do_ipsecdev_hard_start_xmit line=229 msg=“output to IPSec tunnel FireStn2_Spoke1 vrf 0”
id=65308 trace_id=6 func=esp_output4 line=895 msg=“IPsec encrypt/auth”
id=65308 trace_id=6 func=ipsec_output_finish line=629 msg=“send to 172.16.30.1 via intf-wan”
Output on Hub
FG100F-HA1 # id=65308 trace_id=3 func=print_pkt_detail line=5779 msg=“vd-root:0 received a packet(proto=1, 192.168.16.100:1->192.168.0.8:2048) tun_id=10.10.2.3 from MainOffice_Hub. type=8, code=0, id=1, seq=52.”
id=65308 trace_id=3 func=init_ip_session_common line=5964 msg=“allocate a new session-0002a257, tun_id=10.10.2.3”
id=65308 trace_id=3 func=vf_ip_route_input_common line=2605 msg=“find a route: flag=04000000 gw-192.168.0.8 via _default”
id=65308 trace_id=3 func=__iprope_tree_check line=528 msg=“gnum-100004, use int hash, slot=2, len=6”
id=65308 trace_id=3 func=fw_forward_handler line=990 msg=“Allowed by Policy-20:”
id=65308 trace_id=4 func=print_pkt_detail line=5779 msg=“vd-root:0 received a packet(proto=1, 192.168.16.100:1->192.168.0.8:2048) tun_id=10.10.2.3 from MainOffice_Hub. type=8, code=0, id=1, seq=53.”
id=65308 trace_id=4 func=resolve_ip_tuple_fast line=5867 msg=“Find an existing session, id-0002a257, original direction”
id=65308 trace_id=4 func=npu_handle_session44 line=1199 msg=“Trying to offloading session from MainOffice_Hub to _default, skb.npu_flag=00000400 ses.state=00010200 ses.npu_state=0x04000000”
id=65308 trace_id=4 func=ip_session_install_npu_session line=358 msg=“npu session installation succeeded”
id=65308 trace_id=4 func=fw_forward_dirty_handler line=436 msg=“state=00010200, state2=00000000, npu_state=04000400”