It looks as though on switches 4, 5 and 6 only vlan 4 traffic would have access to the rest of your network. With the trunk between switch 5 and 6, I assume you have other vlans on both switches? Those vlans would not have access to the rest of your network, due to the link between 4 and 5 and the link between 3 and 6 only carry vlan 4.
[visualize vertical lines here indicating trunk connections between 6509 above, and 3548 directly below; hard to really draw vertically here]
[visualize vertical lines here indicating VLAN 4 connections between 3548 above, and 2950-24 below]
[visualize vertical line here, connecting 2950-24(6) to laptop below]
Native VLAN is 1, only matters on VLAN trunk ports.
Assuming that VLAN 4 is the only VLAN on those two links between 3548s and 2950-24s, then those connections are VLAN access links, not VLAN trunk links. (Or, they could be VLAN trunks with all but VLAN 4 pruned off.) I guess you could think of them as "VLAN-4-only" trunks.
But VLAN 1 on the 2950-24s is isolated from VLAN 1 on the 6509s and 3548s. Not sure which interface VLAN you're trying to get through to, but I guess it's on or via the 6509s, they're the only devices capable of routing IP.
You either need to string a separate and parallel VLAN 1 connection next to each of those VLAN-4-only connections; or turn those VLAN 4 lines into VLAN trunks. Then it should work.
Is this the same network we were talking about in previous "STP Problem " post? Looks kinda similar in layout, but the bottom switches are different model...
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...