(In order to prevent network security, we need to plug the gaps commonly used by hackers, starting from blocking ports and disabling services. The port is the logical interface between the computer and the external network, and it is also the first barrier of the computer, so the accuracy of the port configuration directly affects the security of our host.)