Each NSX Manager instance to be federated has a tier-0 gateway, tier-1 gateway, and two segments created during NSX Edge deployment and Application Virtual Network (AVN) creation. One of these segments is for local instance use and the other is for cross-instance use. Both segments are initially connected to the same tier-1 gateway. When NSX Manager instances are federated, you create an addtional tier-1 gateway for cross-instance use and migrate the cross-instance segment from the original tier-1 gateway to the new tier-1 gateway. The new tier-1 gateway has locations for both instances enabled on it. This allows you to manage the ingress and egress routing for cross-instance segments when you move them between VMware Cloud Foundation instances independently of local instance segments whose ingress and egress remain unaffected.
Note: Cross-instance segments cannot have overlapping IP addresses/ranges.