Building My Own Virtualization Lab with Proxmox VE

I set up a full virtualization environment using Proxmox VE on a custom-built Ryzen system. This project allowed me to simulate enterprise-level infrastructure from home — running multiple operating systems, testing Active Directory, experimenting with ethical hacking tools, and managing virtual networks. It became my personal lab for learning server administration, cybersecurity, and automation in a safe, isolated environment.

Chris Jedrasik

1 min read

Project Overview

I built a Proxmox VE virtualization lab on my secondary custom PC powered by a Ryzen 7 5800X, 64GB Corsair Vengeance DDR4, and a 1TB NVMe M.2 for Proxmox and VM storage. The M.2’s high read/write speeds make VM snapshots and migrations lightning-fast. A 500GB TeamGroup T-Force SSD serves as extra storage, and I installed an ASUS ROG Strix RTX 2070 for future GPU passthrough—so I can later experiment with AI/ML, 3D rendering, or CAD workloads.

Virtual Machines and Use Cases

Inside Proxmox, I set up several isolated VMs for different learning goals:

  • Ubuntu Server: for learning Linux administration, systemd, and network services.

  • Windows Server 2022: with the full GUI (Desktop Experience) to explore Active Directory, DNS/DHCP, and domain controller management.

  • Kali Linux: a safe environment to practice ethical hacking, penetration testing, and cybersecurity tools.

  • Windows 11 Pro: configured as a “resettable lab machine” that auto-restores to a clean snapshot after reboot, similar to a college computer lab setup.

Key Skills Learned

Through this project, I developed hands-on experience with:

  • Virtualization concepts – hypervisors, networking bridges, and VM provisioning.

  • Storage management – understanding SSD vs NVMe performance and how it impacts VM I/O.

  • Active Directory – creating users, managing group policies, and setting up domain services.

  • Network segmentation – isolating VMs for security and testing safe network exposure.

  • Automation – using shell scripting and PowerShell to streamline backups and restores.

  • Security awareness – maintaining sandboxed environments for safe experimentation.

  • GPU passthrough fundamentals – learning IOMMU grouping, driver binding, and PCIe passthrough setup.

Takeaways

This project turned into my personal home lab — a space to experiment, break things, and fix them. I gained confidence in managing virtual environments, troubleshooting system errors, and understanding real-world IT infrastructure concepts without relying on cloud costs or risking production data.

I now use this setup as a sandbox for ongoing learning, from scripting automation to testing new technologies like Docker, Kubernetes, and self-hosted services.