I see now the issue now. I did have the same setup once in a site.
The issue is that zone can and does apply to multiple network segments. So assigning your sub-interface and your wireless guest interface to the same zone does not bridge them into the same network segment. It only applies the same policies to these two interfaces.
The bgroup (bridge group) is how we bridge two interfaces into the same segment. This is the technique you are using when you add the home wireless interface into the bgroup with the home ethernet connections.
However, you cannot add a sub-interface into a bgroup. This feature is not available.
So you correctly identified one option. You create a new network segment with its own DHCP server and assign this to the sub-interface for your outside WAP. With the zone assignment of guest it will use the same nat and security rules that the internal wireless interface does, but will be a separate network segment.
The only other option I found was to use an external vlan capable switch with the following setup.
Create a bgroup with the internal wireless segment and one ethernet interface
Connect this to an access port on the switch set to the same vlan as your tagged traffic from the wap
Create a trunk port on the switch with the untagged vlan as your home network fo the mgmt ip of the wap and a tagged vlan with the correct vlan-id for the guest traffic
This setup separates the mgmt for the guest wireless on the wap and forwards them back to the SSG on the two different lines connecting the SSG to the managed switch.
The setup burns two more ethernet ports but it does work.