Type of product Other devices — Desktop and Application Virtualization Software Conformance of functionality Product specific Security Target - CC Part 2 conformant Evaluation Facility Epoche & Espri S.L.U. Certification Report CCN-CC/2017-03/INF-2526 Pursuant to the authority vested in me under Act 11/2002 regulating the National Intelligence Centre, and under Article 1 and Article 2.2.c of Royal Decree 421/2004 of March 12th regulating the National Cryptologic Centre, | hereby: Certify that the security of the product “FusionAccess Software version V100R006C20”, developed by Headquarters of Huawei Technologies Co., Ltd. Bantian Longgang District, Shenzhen 518129 P.R. China, has been evaluated using the “Common Methodology for Information Technology Security Evaluation” and the “Common Criteria for Information Technology Security Evaluation” version 3.1 release 4, and it has met the requirements of its Security Target identified as “Huawei FusionAccess V100R006C20 Security Target, version 1.4, 27/09/2018”, for evaluation assurance level EAL3 + ALC_FLR.2. This certificate, its scope and validity are subject to the terms, conditions and requirements specified in the “Reglamento de Evaluaciön y Certificaciön de la Seguridad de las T.I.C.” at PRE/2740/2007, September 19th. The above-mentioned Security Target and Certification Report are available at the National Cryptologic Centre. MRA recognition for components ‘CCRA recognition for components Lup tO EAL4 and ALC FLR onh up to EAL 2 and ALC FLR UN centro criptolögico nacional CERTIFICATE CCN-CC-021/2018 FusionAccess Software version V100RO06C20 Huawei Technologies Co., Ltd, at F4 F Area Administration Building, Madfid, 16 October 2018 ellary of State Director Félix Sanz Roldan The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, version 3.1.R4 and CC Supporting Documents as listed in the Certification Report, for conformance to the Common Criteria for IT Security Evaluation, version 3.1 release 4. This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report. The evaluation has been conducted in accordance with the provisions of the Spanish IT Security Evaluation and Certification Scheme, PRE/2740/2007 September the 19th, and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced. This certificate is not an endorsement of the IT product by the Spanish Scheme or by any other organisation that recognises or gives effect to this certificate, and no warranty of the IT product by the Spanish Scheme or by any other organisation that recognises or gives effect to this certificate, is either expressed or implied.