With HTTPS inspection configured and Outbound Certificate distributed, following behavior being observed:
From internal hosts, browsers reaching destination, substituted certificate is shown as valid and there are no indications of the intercept:
![](/legacyfs/online/checkpoint/64075_pastedImage_5.png)
When remote client (Endpoint VPN) establishes the connection to the same site, certificate is substituted, declared "valid", but the browser indicates the site being "Not Secure":
![](/legacyfs/online/checkpoint/64073_pastedImage_3.png)
Certificate is installed on the remote client in Trusted Root Certification Authorities:
![](/legacyfs/online/checkpoint/64076_pastedImage_6.png)
The culprit was the older certificate issued by the same gateway and installed on clients. After removal of the old certificate, clients' browsers behavior reverted to normal.