IMHO best practice would be to use a VPN to connect in then run RDP over that. If you do that, you still need to port forward an OpenVPN server port like 1194.
Anyway, you could forward 3389 by:
a) Forward the port on each front pfSense (1 and 2) to the WAN of pfSense 3.
b) On pfSense 3 forward 3389 to the server.
c) On all the port forwards, allow pfSense to automatically create an associated firewall rule
d) On pfSense 3 create a gateway group "MyServer" with WAN1 gateway tier 1, WAN2 gateway tier 2.
e) Edit WAN1 and WAN2 gateway and choose a real outside alternative monitor IP for each (like 8.8.8.8 and 8.8.4.4)
e) Use a dynamic DNS service, in Services->Dynamic DNS, add an entry for your name (e.g. myserver.dynsdns-ip.com) and interface "MyServer"
pfSense will monitor the gateways. When WAN1is down, it will change the dynamic DNS name to be the public IP of WAN2. Use the name to connect from outside.
Note: If pfSense 1 and 2 public WAN have dynamic public IPs, then pfSense 3 may not notice when those change. Install the Cron package. Edit the dyndns update job to run frequently (e.g. every 5 minutes) - it will then check the public IPs and notice if they have changed.