About Project
In this project, I built an advanced home lab that focuses on security, high availability, and full control over my infrastructure. The goal was to create an environment similar to enterprise networks, but fully self-hosted and managed by me.
This project has been continuously developed for over 8 years, with many upgrades and improvements over time. If you want to see the earlier stages of this lab and previous changes, feel free to check my older posts - just click one of them below.
The lab combines networking, virtualization, monitoring, security and Zero Trust access into one consistent system.
Notes:
- All inter-network routing & firewall rules are handled by pfSense
- Wazuh SIEM provides centralized security monitoring for the homelab
- Zabbix Server monitors homelab servers, services, and network devices
- User access to services is provided via Pangolin and Cloudflare Tunnel (client on Mini-PC)
- Administrative access is provided via WireGuard VPN (server on pfSense)
- 802.1X authentication enforced on VLAN40 (MGMT) WiFi via FreeRADIUS
- General users connect via VLAN10 (UNIFI WiFi)
- Guest and IoT are isolated in their own VLANs
- Proxmox nodes use Ceph for HA storage
- TrueNAS provided NFS backups for Proxmox and SMB shares for clients
Network Overview
The core of my network is based on pfSense, which acts as the main router and firewall.
The network is divided into two main segments:
- LAN_1 (10.0.0.0/24) – servers and storage
- LAN_2 (172.16.8.0/24) – infrastructure and "UniFi ecosystem"
Additionally, I use VLANs for WiFi segmentation:
- VLAN10 – main WiFi network
- VLAN20 – guest network
- VLAN30 – IoT devices
- VLAN40 – management network (secured with 802.1X)
This segmentation improves security and allows better control over traffic between devices.
Core Networking and Security
The firewall is configured with several important services:
- Zabbix Server is used to monitor the health and availability of homelab infrastructure
- Wazuh SIEM is used for security monitoring and threat detection in the homelab
- Intrusion detection and prevention using Snort
- IP and geo-blocking with pfBlockerNG
- WireGuard VPN for secure remote access
- DHCP, DNS, and SNMP services
- Monitoring agents for infrastructure visibility
This setup creates a strong security layer at the edge of the network.
Server Infrastructure (LAN_1)
In the server network, I run a three-node Proxmox cluster with high availability and Ceph storage.
The cluster hosts:
- Linux containers (LXC) for core services
- Virtual machines including:
- Windows Server 2019 (Active Directory)
- Windows 10 clients
Key services include:
- Wazuh SIEM runs on a dedicated Rocky Linux virtual machine as a standalone server used for operating system monitoring and security event analysis
- Zabbix monitoring (frontend and backend cluster). Zabbix was first deployed on a Raspberry Pi 3 B+ as a standalone installation running Zabbix 6.0 LTS with Apache and MySQL. Over time, the environment was migrated to the Proxmox cluster and redesigned for high availability. The current setup includes: 2x Rocky Linux LXC containers for the Zabbix Frontend (Nginx + Keepalived) and 3x Rocky Linux LXC containers for the Zabbix Backend (MariaDB Galera Cluster + Keepalived).
- Grafana runs as a standalone service on a Rocky Linux LXC and is used for infrastructure visualization and dashboard monitoring
For storage, I use a TrueNAS server that provides:
- NFS for Proxmox backups
- SMB shares for general usage
Infrastructure Network (LAN_2)
The second network segment is focused on infrastructure and network management.
It includes:
- UniFi switch and access point
- A Mini-PC running Debian Linux
- Multiple services in containers (Docker and Podman)
On this host, I run:
- Pangolin and Cloudflare client for Zero Trust connectivity
- FreeRADIUS server for 802.1X authentication
- UniFi controller (Podman)
- Docker services such as Portainer and AdGuard Home
This network acts as a control layer for WiFi and internal services.
Zero Trust Access
For secure user remote access, I use Pangolin.
At the moment, I am still using Cloudflare Tunnel for several services because I am currently migrating everything to a fully self-hosted tunnel solution with Pangolin.
The idea is simple:
- No services are exposed directly to the internet
- All access goes through a central gateway
- Authentication (including 2FA) is required before access is granted
This approach is similar to cloud-based Zero Trust solutions, but fully self-hosted.
Monitoring and Observability
Monitoring is a key part of the system.
I use:
- Zabbix for infrastructure monitoring
- Grafana for dashboards and visualization
- Uptime Kuma for service availability checks
This combination allows me to detect problems quickly and understand system behavior in real time.
Key Features of the Project
- Centralized monitoring with Zabbix and security analysis with Wazuh SIEM
- Strong network segmentation (LAN + VLANs)
- High availability with Proxmox cluster and Ceph
- Secure remote access using Zero Trust model
- Enterprise-style WiFi management with UniFi
- Centralized authentication using FreeRADIUS
Conclusion
This home lab is designed as a realistic simulation of a modern IT infrastructure. It focuses on security, scalability, and reliability.
By combining networking, virtualization, and Zero Trust access, I created an environment that is both powerful and secure.
This project helped me improve my skills in system administration and networking practices, while also giving me a stable platform for testing new technologies.
Using this project 1:1 in a production environment could be difficult to manage because of the large number of different technologies and solutions used together. However, a home lab is one of the best ways to learn new technologies in practice.
For me, independence and security are very important. Today, cloud services are extremely popular, but in the end, the cloud is simply “someone else’s computer”.























































