GLI-19: - Gaming Laboratories International
GLI-19: - Gaming Laboratories International
GLI-19: - Gaming Laboratories International
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>GLI</strong> Standard #<strong>19</strong> – Standards for Interactive <strong>Gaming</strong> Systems (Suppliers) Version 1.0<br />
Final<br />
facility that allows an alternate network path to be established that bypasses the firewall.<br />
Examples of prohibited facilities are:<br />
• An operator PC equipped with a phone modem; and<br />
• An operator PC with a connection to the <strong>Gaming</strong> Platform VLAN and a<br />
connection to the corporate VLAN.<br />
d) The firewall must be a separate hardware device with the following characteristics:<br />
i. Only firewall-related applications may reside on the firewall; and<br />
ii. Only a limited number accounts may be present on the firewall (e.g. <strong>Gaming</strong><br />
Platform administrators only).<br />
e) All data packets addressed to the firewall must be rejected if they arrive on interfaces to<br />
networks which are outside the baseline envelope. This is to restrict access to the firewall<br />
to authorized workstations inside the baseline envelope;<br />
f) The firewall must reject all connections except those that have been specifically approved<br />
by the jurisdiction;<br />
g) The firewall must maintain an audit log of all changes to parameters that affect what<br />
connections are permitted through the firewall;<br />
h) The firewall must maintain an audit log of all successful and unsuccessful connection<br />
attempts through itself;<br />
i) The firewall must disable all communications if the audit log becomes full;<br />
j) The firewall must reject all messages received on an interface if the message purports to<br />
be on a device attached to another interface;<br />
k) Operators must have approved procedures for following reports of security incidents and<br />
for ensuring that firewalls are kept up to date with respect to advisory recommendations<br />
released after such incidents; and<br />
l) Networks on the secure side of the firewall should use RFC<strong>19</strong>18 private network<br />
numbers. These numbers must be translated into public network numbers for<br />
transmission over the Internet.<br />
7.3.13 Web Application Security. The following requirements apply to the security of the<br />
application used in the end player device:<br />
Chapter Seven: Information Systems Security (ISS) Requirements Page 61<br />
Copyright © 2011 <strong>Gaming</strong> <strong>Laboratories</strong> <strong>International</strong>, LLC<br />
All Rights Reserved.