MAC address spoofing changes a device's hardware MAC address to impersonate another device — bypassing MAC-based access controls and network monitoring.
MAC filtering alone is not sufficient security — MAC addresses are trivially spoofed. 802.1X authentication is far more robust. MAC spoofing used to bypass captive portals and MAC-based firewall rules.