rachelelise - I'm not sure that's the case regarding a server TPM.
While it certainly wouldn't hurt, there are firewalls and server agents that can take on that role today, and could likely recognize a trusted device at entry point. The server TPM would enable these firewalls and agents (and their expense) to be replaced over time by a TPM to TPM conversation via middleware. However, this requires the entire infrastructure to function in this manner, and may likely not be the initial rollout scenario.
I could be wrong here, but I would think the most important attestation for allowing entry is verifying the alien client, not the local server.
Tampa123