now for the extra steps: if a bit excessive...
1: simulation of your net by an attacker and test if mac filtering is enabled(Maybe look for a solution)?
2: If he was mac filtered then his mac would be on the sytem and he could associate anyway if not then he would know.
3: Think like an attacker would not just to see if the commands work it all out for you and job done !!!! Too easy.
And yes illegal if use on others and if you see the thread was about a simple full wifi sec guide and that was it.