• Tue. Nov 4th, 2025

CyberWriteUps

CREATE – HACK – DEFEND

Network Topology

  • Home
  • Network Topology

My Home Lab Network Topology

This is how I built out my home lab. Recently, I moved my firewall to OPNsense, which I tested first in VMware. To see more about that, check out my write-up here.


Hardware Overview

Firewall / Router Build

  • Custom-built desktop
  • 1TB SSD
  • 64 GB RAM
  • Intel i7-10700K
  • 5 Intel Ethernet NICs (note: my StarTech NICs lacked drivers for OPNsense at first)
  • Onboard Ethernet + built-in WiFi

Previous Setup

  • Optiplex 9020
  • StarTech NICs
  • 32 GB RAM

Network Segments / Interfaces

I currently use all six Ethernet adapters for:

InterfacePurpose
WANConnection from modem
LANPersonal desktops, gaming systems
WLANMobile devices, TVs, IoT devices
PentestNet LAN“DMZ” / where I experiment / break things
Office LANFor remote work machines
Raspberry Pi – Pi-HoleDNS server used by LAN & WLAN (blocks ads)

Host Machine & Monitoring Setup

VMware Host / Plex Server

  • 4 NICs
  • 128 GB RAM
  • Primary OS: Windows

Important Network Adapters

  • MonitorNet: Used for capturing traffic — connected via mirror port on switch for PentestNet LAN
  • PentestNet: For VMs specifically assigned to the PentestNet subnet

SELKS Deployment in the Lab

SELKS is installed on an Optiplex 9020. It requires two NICs: one for the web / internet interface and another solely for sniffing / monitoring. While SELKS can run in a VM smoothly, I chose to use my recycled hardware for better isolation.
(See my SELKS installation guide for details.)


Why This Setup Works

  • Segmentation: Keeping LAN, WLAN, PentestNet, etc. separated limits security risks.
  • Monitoring: The sniffer interface gives visibility into malicious or abnormal traffic.
  • Flexibility: Using VMware gives me the ability to test without breaking the physical setup.
  • Learning Opportunity: This lab lets me tinker with firewalls, network logs, and real hardware/interfaces.

Next Steps & Resources

If you want to build your own lab or replicate a similar topology:


Author:
Victor Alaman Jr
Cybersecuritywriteups.com