This prevents the attacker from poisoning the entry for the gateway on the victims machine, as shown in the following figure: