I'm surprised at the talk of dictionary attacks.
Dictionary attacks will be ineffective, assuming you have a network policy that locks out user accounts after a certain number of incorrect logins (which is the default). You're offering a dictionary hacker, what, three attempts before the domain account is logged out? Do you not notice multiple domain accounts being locked out all of a sudden?
Secondly, if you authenticate using a vpn on the pix, you can at least log where attempted attacks come from, and then block those ip addresses at your firewall (assuming you've set up logging on your PIX, which you have done, haven't you?). If you simply nat RDP traffic through the firewall to auth against the server, you'll see auth failures in the event logs, but will you see what ip address they come from? Don't believe you will ... so how do you stop external users trying to hack the terminal server?
Thirdly, if you just nat the traffic through, you're relying upon Microsoft's implementation of RDP being secure, and no exploits ever being discovered for it. There previously have been RDP exploits. If more come to light, a hacker owns your server. If not, they first need to hack their way onto an IpSec vpn on your pix before they can try the RDP exploit. Which is more secure? Bear in mind you can create an ipsec vpn that only allows RDP traffic to that particular server.
Fourthly, if you have a perimiter firewall with an available security feature, USE IT. Don't open holes through your firewall, and rely on the security of other boxes behind it. Where's the logic in that?
Personally i'd rather rely on Cisco's implementation of security than Microsoft's, but that's a judgement call. Your mileage may vary.
CCNA, CCSA, MCSE, Cisco Firewall specialist, VPN specialist, wannabe CCSP
