Also allow the HTTPS protocol through your packet filter. We use a "Permitted-Services" service group, which is used in the rule shown below:
Source: Any Service: Permitted-Services Action: Allow (Green Arrow) Destination: Any
The HTTPS protocol, along with all other protocols that we allow, is then included in the Permitted-Services service group. This approach dramatically reduces the number of packet filter rules required.
Well this will allow HTTPS. But it won't go through the proxy. This only allows HTTPS via the packet-filter engine.
In transparent mode, you can see the redirect rule for port tcp/80 to tcp/8080 in the NAT-Table. You can't redirect https because of the nature of the protocoll. Redirect would alter the packet, and https is there to prevent altering/manipulation and reading.