MAC address – MAC spoofing – keep victims away

I have successfully performed a MAC spoofing attack on my open (ad hoc) network with the Macchanger tool (operating system: Kali linux).

I would like to know how the connection can be kept alive (to keep the computer out of the network with the real Mac), as the Windows machine obviously casts when trying to reconnect through the victim's computer (Windows 10) my potash host from the network.