So I think your best bet is to restore to factory default then and build from there on both devices:
SRX
I believe the default config has eth0/0 just as you want to face the ISP and the rest of the ports in a single trust vlan.
So in your diagram we will call trust home.
plug this in and confirm everyting works to the internet on this basic setup.
After confirmation create a new work vlan and vpn vlan by just coping the vlan setup of trust
# show vlan | display set
This will give you the command to create the vlans and just change the names
Now move to the interfaces and delete the trust and then add the desired vlan for each assignment.
skip the port facing the EX for now.
Now create two new zones modeled on trust
# show security zones security-zone trust | display set
now duplicate the security policy for internet access from trust to untrust
# show secuirty policies | display set
duplicate the nat rules for internet access in the new zones
#show security nat | display set
duplicate the dhcp server settings for the subnets on the two new zones
#show system services dhcp display set
Now commit and test all this that the three zones work on the SRX and have internet access.
next will be to extend to the EX switch Create a trunk port between the SRX and EX with the two vlans on this. per the guide in the day one book. Instead of ae interface just substitute the specific interfaces on both sides.
on the EX per the book assign work vlan to the desired port and leave the home vlans as is.