Hell @sergei-bilan
it is best to check the access logs first to make sure it hits correct ID profile /Decryption Policy / Access Policy
you can run Grep from CLI
in the first Question add the Ip address of your test PC : Enter the regular expression to grep.
and for the 4th question Put Y please: Do you want to tail the logs? [N]>
then try to generate some traffic to gmail/google, and check if the policies are hits as expected .
also you might be able to test via GUI >> system administration >> Policy trace,
but access logs are more accurate
if you have any issue reading the Accesslogs, please share the output here.
Regards,
Amirhossein Mojarrad
+++++++++++++++++++++++++++++++++++++++++++++++++++
++++ If you find this answer helpful, please rate it as such ++++
+++++++++++++++++++++++++++++++++++++++++++++++++++
Regards,
Amirhossein Mojarrad
+++++++++++++++++++++++++++++++++++++++++++++++++++
++++ If you find this answer helpful, please rate it as such ++++
+++++++++++++++++++++++++++++++++++++++++++++++++++