Chapter 10 Install and System Administration for FortiOS 5.0 : Advanced concepts : Dual internet connections (redundant Internet connections) : Redundant interfaces : Security policies
  
Security policies
When creating security policies, you need to configure duplicate policies to ensure that after traffic fails over WAN1, regular traffic will be allowed to pass through WAN2 as it did with WAN1. This ensures that fail-over will occur with minimal affect to users. For more information on creating security policies see the Firewall Guide.
See Also
Ping server
Routing
Security policies
Redundant interfaces
Link redundancy and load sharing