First of all you have to configure your Windows 2008 R2 System as you want e.g implement NLB etc…
1 – Run SharePoint Installer and install Prerequisites
If you don’t see the bellow Prerequisite (SQL 2008 R2 Services SharePoint Add-in) you will have to run the Prerequisite Installer 2 Times, I don’t know why this happen in some Farms
Installing SharePoint Server
1 – Provide you CAL and Choose Locations for setup files
2 – Installation Process Dialog
3 – Don’t run “SharePoint 2010 Products Configuration Wizard”, unmark that option and close
4 – Install your Language Pack, in my case Portuguese; once again don’t run the Wizard
5 – Install SharePoint 2010 SP1
6 – Install your Language Pack SP1
7 – Run the “SharePoint 2010 Products Configuration Wizard”
8 – Provide your information below
You can’t use LOCAL Windows Account’s bellow; you must provide an AD Account with permissions over SharePoint and SQL Server (dbcreator + securityadmin). In order to use local account’s see this workaround, GO
9 – Choose your farm Passphare, It’s very important that you keep it because if not, you will not be able to add servers to the FARM
Forgot your Passphare?
Go to Start > All Programs > Microsoft SharePoint 2010 Products > SharePoint 2010 Management Shell and right click to run as administrator
$passphrase = ConvertTo-SecureString -asPlainText –Force
You will be prompted to input a new passphrase in plain text.
Set-SPPassPhrase -PassPhrase $passphrase –Confirm
10 – Finally choose PORT for the Central Administration Application and authentication provider, if you have a small farm leave NTLM
NT LAN Manager (NTLM) is the default protocol type when Integrated Windows authentication is selected. This protocol takes advantage of a three-part challenge-response sequence to authenticate clients. For more information about NTLM, see Microsoft NTLM(http://go.microsoft.com/fwlink/?LinkId=196643).
The Kerberos protocol is a more secure protocol that supports ticketing authentication. A Kerberos authentication server grants a ticket in response to a client computer authentication request, if the request contains valid user credentials and a valid Service Principal Name (SPN). The client computer then uses the ticket to access network resources. To enable Kerberos authentication, the client and server computers must have a trusted connection to the domain Key Distribution Center (KDC). The KDC distributes shared secret keys to enable encryption. The client and server computers must also be able to access Active Directory services. For Active Directory, the forest root domain is the center of Kerberos authentication referrals. For more information about the Kerberos protocol, see How the Kerberos Version 5 Authentication Protocol Works (http://go.microsoft.com/fwlink/?LinkId=196644) and Microsoft Kerberos. (http://go.microsoft.com/fwlink/?LinkId=196645)
Nice blog post.
sort this out please