diff --git a/scripts/firewalk.nse b/scripts/firewalk.nse
index 341df093a..6751e6fdd 100644
--- a/scripts/firewalk.nse
+++ b/scripts/firewalk.nse
@@ -1,21 +1,21 @@
description = [[
-Try to discover firewall rules by using IP TTL expiration technique (method
-also known as firewalking").
+Try to discover firewall rules with an IP TTL expiration technique known
+as "firewalking".
The scan requires a firewall (or "gateway") and a metric (or "target").
-
For each filtered port on the target, send a probe with an IP TTL one greater
-than the number of hops to the gateway. The TTL can be supplied directly or
-retrieved by the script from traceroute results. In this second case, the
-script requires both the gateway IP address and the Nmap --traceroute flag.
+than the number of hops to the gateway. The TTL can be given in two ways:
+directly with the firewalk.ttl script argument, or indirectly with
+the firewalk.gateway script argument. For
+firewalk.gateway, Nmap must be run with the
+--traceroute option and the gateway must appear as one of the
+traceroute hops.
If the probe is forwarded by the gateway, then we can expect to receive an
ICMP_TIME_EXCEEDED reply from the gateway next hop router, or eventually the
target if it is directly connected to the gateway. Otherwise, the probe will
-timeout.
-
-As for UDP scans, this process can be quite slow if lots of ports are blocked
-by the gateway.
+timeout. As for UDP scans, this process can be quite slow if lots of ports are
+blocked by the gateway.
From an original idea of M. Schiffman and D. Goldsmith, authors of the
firewalk tool.