See SSL Verification bypass.
SSL transaction logs are sent to the same systems logs as those used by HTTP. Content Gateway transaction logging is described here.
See Interception bypass.
See the vendor documentation for your transparent routing device.
This section describes how to use resources in Content Gateway and on your PC to troubleshoot certificate verification failures.