‘ENAC =a CIUIN centro criptoldgico nacional CERTIFICATE CCN-CC-40/2022 Huawei ATN Series Routers running VRP software, version V300RO06C10SPC300 Type of product Routers Conformanceof functionality PP Conformancefunctionality Protection Profile Conformance collaborative Protection Profile for Network Devices, v2.1 Evaluation Facility DEKRATesting andCertification S.A.U. Certification Report CCN-CC/2020-41/INF-3895 Expiration Date See Certification Report Pursuantto the authority vested in me underAct 11/2002 regulating the National Intelligence Centre, and underArticle 1 and Article 2.2.c of Royal Decree 421/2004 of March 12th regulating the National Cryptologic Centre, | hereby: Certify that the security of Huawei ATN Series Routers running VRP software, version V300RO06C10SPC300, requested by Huawei Technologies Espafia, S.L., Parque Empresarial Castellana Norte. C/Isabel Colbrand 22. 28050 Madrid (Spain), has been evaluated using Common Methodology for Information Technology Security Evaluation/Common Criteria for Information Technology Security Evaluation version 3.1 release 5, and it has met the requirementsofits documentidentified as “Huawei ATNSeries Routers running VRP software V300RO06C10SPC300Security Target, v1.4 (12 July 2022)”, for evaluation assurancelevel PP compliant. Madrid, 16 November 2022 Secretary of State Director EsperanzLesiro Llamazares This certificate, its scope and validity are subject to the terms, conditions and requirements specified in the “Reglamento de Evaluación y Certificación de la Seguridad de las T.1.C.” at PRE/2740/2007, September 19th. The above-mentioned Security Target and Certification Report are available at the National Cryptologic Centre. This certificate will come into effect the following day that the associated certificate resolution signed by the Secretary of State Director of CCN is published in the Official State Gazette (B.O.E ñ https://www.boe.es). The protection profile identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using Common Methodology for Information Technology Security Evaluation/CommonCriteria for Information Technology Security Evaluation version 3.1 release 5. This certificate applies only to the specific version of the Protection Profile listed in this certificate and in conjunction with the complete Certification/Validation Report. The evaluation has been conducted in accordance with the provisions of the SP IT Security Evaluation and Certification Scheme, PRE/2740/2007 Septemberthe 19th, and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced. This certificate is not an endorsementof the protection profile by the Scheme or by any other organization that recognizesorgives effect to this certificate, and no warranty of the protection profile by the Schemeorby any otherorganization that recognizesorgives effect to this certificate, is either expressed or implied.