Hmm. Ok. If you did traceSM/traceSBC and captured that and wrote your packets to a pcap, that'd be normal. Yes it's a capture, of TLS, but those applications log the packets above the TCP/IP layer. If you that on a tshark right on the wire, I'd be curious to see what you mean by the "packets are able to be read". I mean, there's something readable in there, but it shouldn't be SIP signaling or anything relative to your remote worker flow.
So, either you goofed and told the SBC to relay unencrypted stuff on 5061 - just telling it to use 5061 doesn't explicitly pop a TLS profile in there - or, you're somewhere in limbo with how it handles certs. It shouldn't be hard on the inside - the SBC just needs to trust what SM offers, that's an easier thing to do on it than configure a cert for it to offer endpoints, but still. Try default certs on the inside part? I mean, not trying to start a handshake is weird. I've complained probably a few times in this thread and in others about how bad the SBC is at administering certs on - where it won't do what you tell it and won't let you know. Do you think you've hit that part?
I can give ya some oneliners to import certs via CLI, but its tedious, needs to be done on each SBC and is basically you throwing in the towel on the admin interface. Patch to latest? Open a ticket at Avaya if you've got the support?