community

Building a Home Lab SOC with UniFi and Sentinel Nerd

A comprehensive guide to building a home Security Operations Center using UniFi hardware and Sentinel Nerd, from hardware selection to daily monitoring operations.

TM

Tony Martinez

#homelab #soc #tutorial #community

There’s no better way to learn security operations than by building your own Security Operations Center (SOC). A home lab SOC gives you hands-on experience with real threats, real monitoring, and real incident response — all in an environment where mistakes are safe to make.

UniFi hardware makes this accessible and affordable. Sentinel Nerd turns it into a genuine security monitoring platform. In this guide, we’ll build a complete home lab SOC from scratch.

Why Build a Home SOC?

A home lab SOC is valuable whether you’re:

  • Learning security operations for a career in cybersecurity
  • Practicing incident response before you need it in production
  • Actually protecting your home network from real threats (yes, they target home networks too)
  • Testing security tools before deploying them at work
  • Building a portfolio to demonstrate hands-on security skills

The threats are real. Home networks face port scans, brute force attempts, IoT botnet recruitment, and more. Your home SOC will find them.

Hardware List

Here’s the recommended hardware for a fully featured home lab SOC:

Core Network

DevicePurposeApproximate Cost
UniFi Dream Machine Pro (UDM-Pro)Router, firewall, IDS/IPS, NVR$379
UniFi Switch Lite 16 PoENetwork switching with PoE for cameras/APs$199
UniFi U6 Pro Access PointWi-Fi 6 with VLAN support$149

Security & Physical Access

DevicePurposeApproximate Cost
UniFi G4 Bullet CameraOutdoor surveillance$109
UniFi G4 Instant CameraIndoor surveillance$29
UniFi Access Reader G2Door access control (optional)$99
UniFi Access HubAccess controller (optional)$99

Total: ~$1,064-$1,262

You can start smaller. The UDM-Pro alone gives you routing, firewall, IDS/IPS, and syslog — enough for network monitoring. Add cameras and access control as your budget allows.

Budget alternative: A UniFi Cloud Gateway Ultra ($129) works as a starting point if the UDM-Pro is too expensive. You’ll lose the NVR functionality but keep the core networking and security features.

Network Design

Here’s the network architecture for our home lab SOC:

VLAN Layout

VLANSubnetPurpose
1 (Default)192.168.1.0/24Management — UniFi devices only
1010.0.10.0/24Trusted — Workstations, laptops
2010.0.20.0/24Lab — Test devices, VMs
3010.0.30.0/24IoT — Smart devices, home automation
4010.0.40.0/24Cameras — UniFi Protect cameras
5010.0.50.0/24Guest — Visitor Wi-Fi

Wi-Fi Networks

SSIDVLANSecurityPurpose
HomeNet10WPA3 PersonalDaily use devices
Lab-Net20WPA2 PersonalLab and test devices
IoT-Net30WPA2 PersonalSmart home devices
Guest50WPA2 PersonalGuest access

Firewall Rules

Apply these in order:

  1. Allow established/related traffic
  2. Allow Trusted (VLAN 10) to all local networks
  3. Allow Lab (VLAN 20) to Internet only
  4. Allow IoT (VLAN 30) to Internet only, block local
  5. Allow Cameras (VLAN 40) to Management only (for NVR)
  6. Allow Guest (VLAN 50) to Internet only
  7. Block all inter-VLAN traffic (default deny)

Installing Sentinel Nerd

With your network set up, it’s time to add monitoring:

1. Create Your Account

Sign up at sentinelnerd.com/auth/signup. The Starter plan ($29/month) is perfect for a home lab — it supports one controller and includes AI analysis credits.

2. Connect Your UniFi Controller

In the Sentinel Nerd dashboard:

  1. Go to Settings > Integrations > UniFi Controllers
  2. Click Add Controller
  3. Enter your UDM-Pro’s IP or UniFi.ui.com address
  4. Provide admin credentials (we recommend creating a dedicated read-only admin account)
  5. Test the connection

3. Configure Syslog Forwarding

On your UDM-Pro:

  1. SSH into the device or use the UniFi controller UI
  2. Navigate to Settings > System > Remote Logging
  3. Set the syslog server to your Sentinel Nerd syslog endpoint
  4. Enable logging for all categories

Events should start appearing in Sentinel Nerd within seconds.

4. Enable IDS/IPS

If you haven’t already:

  1. In UniFi controller, go to Settings > Security > Internet Threat Management
  2. Enable Intrusion Detection System
  3. Set to IPS mode (prevention) for the WAN interface
  4. Choose a threat level (we recommend starting with the default)

Setting Up Integrations

A SOC isn’t just about detection — it’s about notification and response.

Slack (or Discord) Alerts

Set up a notification channel so you see alerts in real time:

  1. Create a #home-soc-alerts channel in your Slack or Discord server
  2. Create a webhook (see our Slack integration guide for details)
  3. In Sentinel Nerd, add the webhook as an alert channel
  4. Route critical and high severity alerts to this channel

Email Notifications

Configure email as a backup alert channel:

  1. Go to Settings > Integrations > Alert Channels > Add Channel > Email
  2. Enter your email address
  3. Set it to deliver critical alerts only (to avoid inbox overload)

Creating a Detection Rule Library

The built-in rules cover the basics. For your home lab, add these custom rules:

Smart Home Device Monitoring

id: iot-device-new-connection
name: IoT Device Making New External Connection
description: An IoT device is connecting to a new external IP not seen before
severity: medium
category: iot-security
enabled: true

conditions:
  - field: event.type
    operator: equals
    value: client_traffic
  - field: vlan_id
    operator: equals
    value: 30
  - field: destination.is_internal
    operator: equals
    value: false
  - field: destination.first_seen
    operator: equals
    value: true

actions:
  - alert
  - tag: iot-new-destination

Home Network Reconnaissance Detection

id: internal-port-scan
name: Internal Port Scan Detected
description: A device is scanning multiple ports on internal hosts
severity: high
category: reconnaissance
enabled: true

conditions:
  - field: event.type
    operator: equals
    value: firewall_rule_match
  - field: rule.action
    operator: equals
    value: deny
  - field: source.is_internal
    operator: equals
    value: true

aggregation:
  group_by: source_ip
  distinct_count: destination_port
  threshold: 20
  window: 5m

actions:
  - alert
  - tag: port-scan

Guest Network Abuse

id: guest-excessive-bandwidth
name: Excessive Guest Network Usage
description: A guest device is using unusually high bandwidth
severity: low
category: policy
enabled: true

conditions:
  - field: event.type
    operator: equals
    value: traffic_summary
  - field: vlan_id
    operator: equals
    value: 50
  - field: bytes_total
    operator: greater_than
    value: 10737418240

actions:
  - alert
  - tag: bandwidth-abuse

Unauthorized Device on Trusted VLAN

id: unknown-device-trusted
name: Unknown Device on Trusted Network
description: An unrecognized device connected to the trusted VLAN
severity: high
category: unauthorized-access
enabled: true

conditions:
  - field: event.type
    operator: equals
    value: client_connect
  - field: vlan_id
    operator: equals
    value: 10
  - field: client.is_known
    operator: equals
    value: false

actions:
  - alert
  - tag: unknown-device

Monitoring Dashboard Setup

Configure your Sentinel Nerd dashboard for SOC operations:

  1. Event stream — Real-time feed of all security events (top of dashboard)
  2. Alert summary — Count of open alerts by severity (top right)
  3. Top source IPs — Most active threat sources in the last 24 hours
  4. Device health — Status of all monitored UniFi devices
  5. Event timeline — Hourly event volume chart to spot anomalies
  6. Geographic map — Source locations of external threats
  7. Top detection rules — Which rules are firing most often
  8. Active Response log — Recent automated actions taken

Creating a Morning Routine

A real SOC has regular check-in procedures. For your home lab:

Daily (5 minutes):

  • Check Slack/Discord for any alerts since last check
  • Review the alert summary widget for unacknowledged alerts
  • Glance at the event timeline for unusual spikes

Weekly (15 minutes):

  • Review all medium and low severity alerts from the past week
  • Check device health for any offline devices
  • Review top source IPs and check any new ones against threat intelligence
  • Update detection rule thresholds based on observed patterns

Monthly (30 minutes):

  • Review and tune detection rules (disable noisy ones, refine thresholds)
  • Check firmware versions on all UniFi devices
  • Review firewall rules for any needed updates
  • Generate a monthly summary report for your records

Ongoing Operations

Investigating Alerts

When an alert comes in, follow this process:

  1. Read the alert — What rule triggered? What device? What’s the severity?
  2. Check context — Look at the source IP, destination, timing. Use threat intelligence enrichment.
  3. Run AI analysis — Let GPT-4 provide initial triage and MITRE ATT&CK mapping.
  4. Decide action — Is this a true positive? Does it require response?
  5. Respond — Block, quarantine, or simply acknowledge based on severity.
  6. Document — Add a note to the alert with your findings and actions.

Building Incident Reports

When something interesting happens (and it will), write it up:

  • What triggered the investigation?
  • What did you find?
  • What actions did you take?
  • What would you do differently?

These reports are gold for your portfolio and learning.

Simulating Attacks (Safely)

Use your Lab VLAN (VLAN 20) to generate realistic security events:

  • Nmap scans from a lab machine targeting other lab devices
  • Hydra for SSH brute force testing against a test server
  • Metasploit for vulnerability scanning and exploitation practice
  • DNS tunneling tools to test your DNS monitoring rules

Always keep attack simulations on the Lab VLAN. Never test against production VLANs or external targets.

Community Resources

You’re not building this alone. Connect with the community:

  • Sentinel Nerd Discord — Share rules, ask questions, show off your setup
  • r/homelab — The homelab subreddit has great UniFi SOC discussions
  • UniFi Community Forums — Deep knowledge about UniFi hardware configuration
  • SANS Holiday Hack — Annual CTF challenge to test your SOC skills

Share your home lab SOC build with us on Discord or Twitter. We love seeing what the community creates.


A home lab SOC isn’t just a learning exercise — it’s genuine security monitoring for your home network. The threats targeting home networks are real, and the skills you build here transfer directly to professional security operations.

Start with the basics, build incrementally, and make it part of your routine. Within a few weeks, you’ll have a working SOC that most small businesses would envy.

Happy monitoring.

Share this article

Ready to secure your UniFi network?

Start your free 14-day trial today. No credit card required.

Start Free Trial