Skip to content

🚀 Homelab Build Journey: Building a Virtual Security Lab with Proxmox

TL;DR: Plain-English build story of the lab: how I chose hardware, validated images, segmented the network, and added secure remote access. Highlights repeatable steps and risk-thinking that non-technical stakeholders can follow. Outcome: validated Proxmox install with checksums/GPG and network segmentation completed day 1.

This page is a write-up of how I planned, built, and secured my homelab. It complements the Homelab Infrastructure (Summary) by documenting the full journey — from hardware selection to ongoing improvements.


🎯 Purpose

This lab serves as my personal testing ground where I can safely: - Experiment with security tools and configurations
- Practice incident response scenarios
- Learn new cybersecurity techniques
- Test solutions before applying them in production


📋 Planning Phase

Just like in a professional deployment, I started with careful planning:
- Researched the best hardware for my needs (settled on the Beelink SER5 Mini PC)
- Created a checklist to avoid oversights
- Designed for security-first from day one
- Documented each step for repeatability

Beelink SER5 Mini PC Beelink SER5 Mini PC : Chosen as the base system for virtualization and SOC tools deployment.


📝 Step-by-Step Implementation

1. Getting Started

  • Downloaded Proxmox VE from the official site
  • Verified SHA256 checksum for integrity
  • Validated GPG signatures
  • Created bootable media with Balena Etcher

Proxmox Installer
Proxmox Installer : Verified image and bootable media.


2. BIOS Setup

  • Accessed BIOS (Delete/F2/F10 on startup)
  • Enabled virtualization features (AMD-V)
  • Adjusted boot sequence for USB install
  • Saved hardened configuration

BIOS Screenshot
BIOS Settings : Virtualization and security features enabled.


3. Installation & Security

  • Installed Proxmox VE with strong admin credentials
  • Configured secure authentication defaults
  • Applied immediate post-install updates

4. Network Setup

  • Configured pfSense firewall
  • Created VLAN segmentation for isolation
  • Applied firewall rules for remote access
  • Added monitoring for visibility

Network Diagram Homelab Network Diagram : Segmented VLANs for red/blue teams and shared services.


5. Ongoing Hardening

  • Applied rolling updates and patches
  • Introduced backup policies
  • Layered extra security controls over time

Proxmox Dashboard
Proxmox Dashboard : Active SOC, red team, and service VMs.


📈 Project Impact & Growth

🧠 Key Learning Outcomes

  • Infrastructure Management → virtualization, monitoring, and secure administration
  • Security Implementation → SOC deployment, vuln scanning, incident response
  • Professional Development → documentation, problem-solving, project management

⭐ Ongoing Improvements

  • Adding advanced SOC integrations (SIEM, IDS tuning)
  • Expanding self-hosted services with automation (Ansible, CI/CD)
  • Optimizing performance monitoring and backups

💼 Professional Applications

This journey demonstrates practical ability to:
- Build secure and scalable infrastructures
- Deploy enterprise-grade SOC tools in a lab setting
- Document and communicate technical processes clearly
- Translate lab work into real-world security operations skills


📌 Key Takeaway

What began as a personal experiment matured into a comprehensive homelab platform. This project reflects my ability to plan, secure, and operate complex environments while documenting the journey with a professional, security-first mindset.