from their whitepaper:
During SSL session establishment, the SSL Inspector appliance acts as a Certificate Authority (CA). The server certificate that would be usually stored in the server and transmitted to the client as part of the SSL protocol is transparently re-signed by the SSL Inspector. The name of the server in the certificate remains un- changed, but the signature of the CA belonging to the SSL Inspector is applied. A key is maintained for the SSL server in which all of the details are known to the SSL Inspector appli- ance. The modified certificate is transmitted to the SSL client. Instead of the original server key, a different key is used between the SSL Inspector and SSL client. Since the private key associ- ated with the modified certificate is known to the Netronome SSL Inspector, the whole SSL handshake can proceed success- fully.
If the SSL clients are configured to use the Netronome SSL Inspector as a trusted Certificate Authority the SSL client will see the server certificate as a valid CA-signed certificate. This process is called “re-signing,” and allows the Netronome SSL Inspector to transparently intercept SSL communications.