Homelab & Networking Setup
One-Minute Summary
I built a comprehensive cybersecurity homelab environment featuring: • Proxmox VE virtualization platform with optimized storage management and enterprise repository configuration • Multiple Arch Linux VMs with custom shell environments, development tools, and security hardening • Secure file sharing system using Samba with NTFS drive integration and proper access controls • Network security implementation with SSH hardening and user privilege management
Project Timeline
Proxmox Setup
Installed Proxmox VE, configured storage, disabled enterprise repos
Arch Linux Deployment
Deployed and configured multiple Arch Linux VMs with custom environments
File Sharing & Security
Implemented Samba file sharing with NTFS integration and SSH security
Testing & Documentation
Comprehensive testing, performance optimization, and documentation
Copy-Paste Reproduction
Here's the minimal command sequence to reproduce this setup:
# 1. Configure Proxmox repositories (on Proxmox host)
sudo nano /etc/apt/sources.list.d/pve-enterprise.list # Comment out enterprise repo
echo "deb http://download.proxmox.com/debian/pve bookworm pve-no-subscription" | sudo tee /etc/apt/sources.list.d/pve-no-subscription.list
sudo apt update && sudo apt upgrade -y
# 2. Setup file sharing (on Proxmox host)
apt update && apt install -y ntfs-3g samba openssh-server
mkdir -p /mnt/ntfs1 /mnt/ntfs2
mount -t ntfs-3g /dev/<your-disk1> /mnt/ntfs1
mount -t ntfs-3g /dev/<your-disk2> /mnt/ntfs2
# 3. Configure Samba and SSH security
adduser <your-username>
smbpasswd -a <your-username>
sed -i 's/^#\?PermitRootLogin.*/PermitRootLogin no/' /etc/ssh/sshd_config
systemctl restart ssh smbd nmbd