ohhh ok I get what your saying. so basically look at connected Mac address's to see which ones are allowed, and then connect using one of the allowed Mac address's. also would I have to wait for them to get out, or using the fake auth atk with one of the connected mac address's work?