diff --git a/doc/scapy/installation.rst b/doc/scapy/installation.rst
index 1f4faaec0b95539553677e772e3c68c62ba4f770..94454afe81783672deee6c2af9609d303a2e16a4 100644
--- a/doc/scapy/installation.rst
+++ b/doc/scapy/installation.rst
@@ -164,6 +164,7 @@ Here are the topics involved and some examples that you can use to try if your i
 
   .. code-block:: python 
   
+     >>> load_module("nmap")
      >>> nmap_fp("192.168.0.1")
      Begin emission:
      Finished to send 8 packets.
diff --git a/doc/scapy/usage.rst b/doc/scapy/usage.rst
index 34e2bc9f7c5acf03a43771e04b69a7fad809ae2c..1ac80e84bb0d665da6dfd383a0838bc40ac6d694 100644
--- a/doc/scapy/usage.rst
+++ b/doc/scapy/usage.rst
@@ -23,7 +23,7 @@ administrator privileges::
 
 If you do not have all optional packages installed, Scapy will inform you that 
 some features will not be available:: 
-
+                                 
     INFO: Can't import python gnuplot wrapper . Won't be able to plot.
     INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
 
@@ -1489,11 +1489,15 @@ Once we obtain a reasonable number of responses we can start analyzing collected
 nmap_fp
 ^^^^^^^
 
-If you have nmap installed you can use it's active os fingerprinting database with Scapy. First make sure that version 1 of signature database is located in the path specified by::
+Nmap fingerprinting (the old "1st generation" one that was done by Nmap up to v4.20) is supported in Scapy. In Scapy v2 you have to load an extension module first::
+
+    >>> load_module("nmap")
+
+If you have Nmap installed you can use it's active os fingerprinting database with Scapy. Make sure that version 1 of signature database is located in the path specified by::
 
     >>> conf.nmap_base
 
-Scapy includes a built-in ``nmap_fp()`` function which implements same probes as in Nmap's OS Detection engine::
+Then you can use the ``nmap_fp()`` function which implements same probes as in Nmap's OS Detection engine::
 
     >>> nmap_fp("192.168.1.1",oport=443,cport=1)
     Begin emission: