What are the essential prerequisites for conducting a comprehensive vulnerability scan on a router switch?