--- org/net-snmp-5.7.1.pre1/man/snmp.conf.5      2011-08-10 17:57:12.000000000 +0200
+++ new/net-snmp-5.7.1.pre1/man/snmp.conf.5      2011-08-10 18:56:37.000000000 +0200
@@ -249,14 +249,14 @@
 being used (auth keys: MD5=16 bytes, SHA1=20 bytes;
 priv keys: DES=16 bytes (8
 bytes of which is used as an IV and not a key), and AES=16 bytes).
-.IP "sshtosnmpsocketperms PATH"
-Sets the path of the sshtosnmp socket created by an application
+.IP "sshtosnmpsocket PATH"
+Sets the path of the \fBsshtosnmp\fR socket created by an application
 (e.g. snmpd) listening for incoming ssh connections through the
-sshtosnmp unix socket.
+\fBsshtosnmp\fR unix socket.
 .IP "sshtosnmpsocketperms MODE [OWNER [GROUP]]"
-Sets the mode, owner and group of the sshtosnmp socket created by
-an application (e.g. snmpd) listening for incoming ssh connections
-through the sshtosnmp unix socket.  The socket needs to be read/write
+Sets the mode, owner and group of the \fBsshtosnmp\fR socket created by
+an application (e.g. \fBsnmpd\fR) listening for incoming ssh connections
+through the \fBsshtosnmp\fR unix socket.  The socket needs to be read/write
 privileged for SSH users that are allowed to connect to the SNMP
 service (VACM access still needs to be granted as well, most likely
 through the TSM security model).
