Lab 3 Details:If you do not have the Hardware or Software, then review the lab only…Hardware/Software Setup RequiredRouter or CISCO Packet Tracer 5.0 (available at http://www.cisco.com/web/learning/netacad/index.html)Note: The lab requires a CISCO router.Problem DescriptionWhen investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. This is done by port-scanning every router’s IP information.In this lab, you will practice acquiring volatile information from a router using various show commands.Problem DescriptionWhen investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. It can be carried out by port-scanning every router IP.In this lab, you will practice acquiring volatile information from a router using various show commands.Estimated completion time: 60 minutes.OutcomeReport the steps for performing the task above.Validation/EvaluationHow to use various show commands to display the following information:o Clock details o Router’s versiono Running configurationo Startup configurationo Routing tableo ARP tableo List of userso List of interfaceso Routing protocols