diff --git a/docs/refguide.xml b/docs/refguide.xml
index 0d4a72312..1e656bc91 100644
--- a/docs/refguide.xml
+++ b/docs/refguide.xml
@@ -348,10 +348,15 @@ you would expect.
If no host discovery options are given, Nmap sends an ICMP
echo request, a TCP SYN packet to port 443, a TCP ACK packet to
- port 80, and an ICMP timestamp request. These defaults are
+ port 80, and an ICMP timestamp request. (For IPv6, the ICMP
+ timestamp request is omitted because it is not part of ICMPv6.)
+ These defaults are
equivalent to the options.
- An exception to this is that an ARP scan is used for any targets
- which are on a local ethernet network. For unprivileged Unix shell
+ The exceptions to this are the ARP (for IPv4) and Neighbor
+ DiscoveryNeighbor Discoveryfor host discovery
+ (for IPv6)
+ scans which are used for any targets on a local ethernet network.
+ For unprivileged Unix shell
users, the default probes are a SYN packet to ports 80 and 443 using
the connect system
call.unprivileged userslimitations of
@@ -362,8 +367,8 @@ you would expect.The options (which select
ping types) can be combined. You can increase your odds of
penetrating strict firewalls by sending many probe types using
- different TCP ports/flags and ICMP codes. Also note that ARP
- discovery
+ different TCP ports/flags and ICMP codes. Also note that
+ ARP/Neighbor Discovery
()
is done by default against
targets on a local ethernet network even if you specify other