See Interception bypass.
SSL transaction logs are sent to the same systems logs as those used by HTTP. Content Gateway transaction logging is described here.
See the vendor documentation for your transparent routing device.
See SSL Verification bypass.
This section describes how to use resources in Content Gateway and on your PC to troubleshoot certificate verification failures.