This is where you stop being a person who uses computers and start being a person who builds systems. Proxmox replaces your VirtualBox. Your desktop stops being "Ubuntu with some VMs" and becomes a dedicated virtualization node. You'll build proper network segmentation, migrate your existing services, and start thinking in terms of infrastructure rather than individual apps.
// Proxmox Installation
✓
Get a second SSD (even 120GB is enough) and install Proxmox on itDual boot setup — Ubuntu for daily work, Proxmox for homelab. Don't nuke your daily driver yet.
✓
Access Proxmox web UI at https://your-ip:8006Get comfortable with the interface before touching anything else.
✓
Understand the difference between VMs and LXC containers in ProxmoxLXC = lightweight, shares kernel, great for services. VM = full isolation, needed for Windows, pfSense, etc.
✓
Create VM templates for Ubuntu Server and DebianClone from template instead of reinstalling every time. This is the first taste of infrastructure efficiency.
✓
Learn snapshots — create, restore, deleteSnapshot before every major change. Restore when you break something. You will break something.
✓
Configure Proxmox storage — local, local-lvm, and add your HDDs as storageYou have 8TB of HDDs. Add them as a directory storage pool for VM disks and backups.
✓
Set up automated Proxmox backups (PBS or built-in backup)Schedule nightly VM backups to your HDD storage. If it's not backed up it doesn't exist.
// Network Segmentation with VLANs
✓
Understand VLANs conceptually — tagged vs untagged, trunks, access portsDraw it on paper before configuring it. What traffic goes where and why.
✓
Create Linux bridges in Proxmox for network separationvmbr0 for management, vmbr1 for services, vmbr2 for lab/experimental traffic.
✓
Deploy pfSense or OPNsense as a VM — your virtual router/firewallThis is the backbone of proper network segmentation. All inter-VLAN traffic routes through here.
✓
Configure firewall rules between VLANsManagement VLAN can reach Services VLAN. Lab VLAN is isolated from everything. Understand why each rule exists.
✓
Document your network topology as a diagramDraw.io or Excalidraw. Every VLAN, every VM, every connection. Keep it updated.
// Service Migration into Proxmox
✓
Migrate your Docker stack into a dedicated Docker VM inside ProxmoxDon't mix everything in one VM. Docker services live in the Docker VM, DNS in DNS VM, etc.
✓
Migrate Pi-hole/AdGuard into its own LXC containerDNS should be lightweight and always-on. LXC is perfect for this.
✓
Move your SOC lab (Wazuh, Kali, Metasploitable) into Proxmox VMsPut them on your isolated lab VLAN. Now your SOC lab has real network isolation.
✓
Set up WireGuard VPN inside ProxmoxNow your VPN gateway lives in the infrastructure layer, not on your Ubuntu desktop.
// Exit Checkpoints
✓
Can spin up a new VM from template in under 5 minutes
✓
VLAN segmentation is working — lab traffic can't reach services traffic
✓
All previous services running inside Proxmox, nothing left on bare Ubuntu
✓
Can recover a failed VM from snapshot or backup
✓
Network topology diagram is accurate and up to date
✓
You think in VMs/containers, not in "apps on my computer"