This has just helped me fix an issue.
A client making a call-home connection to an external public server which uses private certificates.
In SmartConsole logs the connection look fine and allowed with no inspection.
But we also saw logs of the firewall's public IP accessing the same server.
In a packet capture on client side, you could see the 'client hello' was being sent a RST back from the server IP.
But on a server side capture, you could see a full handshake.
In turns out this starting after we had enabled Microsoft Tenant Restriction, and places the inspect rule for the Microsoft login pages, above the bypass previously allowing this connection to work. Moved the bypass above and hey presto, thank you 🙂