I have some sort of routing/filtering issue that i cannot figure out. Setup: Cisco 2811 w/12.4 at branch office, frame relay to main office 3845 then a 4507 switch that is doing all routing, internet request are routed to a 3825 with Pix 515, IPS and spyware appliance in front of it. Users at the branch office can access HTTP we sites fine, when they try to access an HTTPS web site they get page cannot be displayed error. I have done as much tracing as i know how to and have figured that the HTTPS traffic is not even getting to the Spyware appliance, which is first in line to access the internet. Apparently somthing between the 2811 and the 4507 is blocking/dropping this traffic. I have verified that there are no ACL's on any of this equipment. Thanks for your assistance.
There are a couple of alternatives which may help you see traffic through the routers in the data path. The first one that I would mention is NetFlow. NetFlow is pretty easy to turn on and has very minimal impact on the running system. It should show traffic going through the router showing source and destination address and source and destination port (be aware that the port numbers are displayed in hex so you need to translate the port number that you are looking for - though for your purposes seeing source and destination address may be sufficient).
Another alternative to consider would be using an ACL. Your previous post indicates that there are no ACLs being used so we would create a new ACL rather than modify an existing ACL. The objective is not to deny any traffic but just to show certain traffic going through the router. So create an ACL that does a permit for the traffic that you are interested in (perhaps pemit any any with the https port) and perhaps the log option if you want to see it printed out. Then a permit any any so that all traffic passes through. Then assign the ACL to the interface. I would probably put it on the outbound interface so that you can see that the traffic is passing through. An example might look like this, assuming that the outbound interface of the router was Fastethernet1/0:
access-list 101 permit tcp any any eq 443 log
access-list 101 permit ip any any
ip access-group 101 out
then do some test traffic and watch your syslog for output showing traffic going through for HTTPS.
You might also consider turning on ip accounting as a way to observe traffic through the router and look for HTTPS.