Here's the deal on SEP and Wireless networks: SEP's Network Defender module doesn't recognize the wireless clients and thinks they are a threat, so it then sends garbage to the wireless access point causing the WAP to think there is a failed NIC on the network or that there is an internal error, the WAP in an attempt to overcome the issue does a wireless restart. This can be caused by either a system running wireless or wired. I have experienced this issue with a wired system being the only one with SEP installed, once uninstalled all was well. This is both a flaw in SEP and in DLink firmware. Odd, the antivirus acting as a virus because it doesn't recognize the wireless network as a legitimate network. One possible solution is if you could disable the Network Defender module, however SEP does not have that option that I have seen. Just to clarify, SEP's Network Defender Module is a Host Based Intrusion Prevention System not the SEP Firewall module, however the firewall module could be misidentifying the IPv6 packet burst as a potential DDOS attack or rogue network adapter.