
Cross-VC NSX: Easy and Flexible Multiple Deployments
As you know,
The benefits of this feature are clear at a glance — mobility, workload balancing, resource pooling, centralized management and security policies for vCenter domains / sites, and disaster recovery. This article is not about detailed technical indicators, but the ease and flexibility of using
In this example, vCenter, the primary NSX Manager, and Universal Controller Cluster (UCC) are deployed on site 1. The secondary NSX Manager registered with the primary NSX Manager is deployed on site 2 with the corresponding vCenter.

Figure 1
Figure 2 shows the NSX
There are only 3 universal controllers on the main site that manage all universal and local objects for all vCenter domains inside the

Figure 2
As seen in Figure 3, the Universal Controller Cluster is deployed in the Edge cluster on site 1.

Figure 3
Once NSX configurations are configured, the primary and secondary roles for NSX Manager are selected, and UCC is deployed, you can start creating logical networks connecting different sites with a single click of a button.

Figure 4
If the user wants to get Active / Active deployments, where the active workloads for the same segment are on both sites (deployment configuration with one high availability server), this can easily be done using logical intervals on both sites. In addition, since
Figure 5 shows the application of the Universal Distributed Firewall rules to the Universal Section.

Figure 5
If the user wants only site 1 to be the outlet for North / South traffic, then this can be done using the Universal Control VM deployment, which is at the Universal Distributed Logical Router (UDLR) management level on the main site, and also using metric / weight routing to ensure that all North / South traffic passes through the Edge Service Gateways (ESGs) of site 1.
In this model, North / South traffic matches the active / passive model, where Site 1 Edge Service Gateways are active and Site 2 Edge Service Gateways are passive with respect to North / South traffic.
Existence of a single site at the Ingress / Egress point for North / South traffic simplifies the process of deployment and further actions and may be required for cases when tracking services use North / South traffic and asymmetric traffic flows should be avoided. An example of such a deployment is shown below.

Figure 6
If a user needs Active / Active North / South traffic flows and is not concerned about the asymmetry of traffic flows, or he has
Local Egress allows you to control which routes are provided for ESXi hosts based on a unique identifier, the so-called Locale ID. All hosts within the NSX Manager domain have the same Locale ID; by default, this is the UUID of the NSX
Universal Control VM on each site learns routes from the physical network through the ESG of the local site. UCC then explores the best routes with the accompanying Locale ID from the Universal Control VM of each site. Finally, UCC distributes best route information to ESXi hosts with the corresponding Locale ID. This deployment using Local Egress is shown below. Note that in this deployment model, Universal Control VM is present on every site.

Figure 7
As you can see,

Figure 8