I have a few locations with a similar setup- but with only one primary wan connection. The VDOM guide is a bit hard to follow, but once I realized how it handled things, it became relatively simple- albeit involved. You have to think of the VDOMs as completely separate firewalls and design your routing around that. The long story short is that the VIP needs to exist in the root VDOM to forward traffic to the internal VDOM, and then the internal VDOM needs another VIP to forward traffic to the final destination.
The longer story- which tripped me up a bit was that in my case I needed to assign the VDOM links IP addresses in order for the VIP to work since I had overlapping subnets behind those VDOMs. The documentation doesn' t explain it clearly enough (at least for me perhaps) that the correct way to handle that is to assign the VDOM links some throwaway subnet unique to them and then set the external VIP to forward to the destination vdom link IP.
For example- the root VDOM is 192.168.0.1/24, the VDOM1 is 192.168.1.1/24 and VDOM2 is 192.168.2.1/24. You would create a vdom link between the root and VDOM1 with the root side as 10.0.0.1/30 and the VDOM1 side 10.0.0.2/30. The addresses and masks don' t really matter as long as they are unique. The VDOM link between root and VDOM2 could be 10.0.0.101/30 and 10.0.0.102/30 respectively.
The outside VIP would forward ports from the external ip address to the VDOM1 link interface to 10.0.0.2. Inside the VDOM1, you would need to set up another VIP to take traffic arriving on the VDOM link to forward to the correct destination such as a web server at 192.168.1.123.
The same thing would be repeated for the VDOM2, in the root VDOM you forward a port to 10.0.0.102 to knock on VDOM2' s door, and then inside VDOM2, take that traffic and forward to the appropriate location.
On the way out- you set your default gateway on computers inside the VDOM to be the PHYSICAL interface IP of the VDOM (192.168.1.1 in my example above) and the default route inside that vdom points to the root side of the VDOM link (10.0.0.1). Then in the root VDOM you have rules that allow traffic from the VDOM link out to the appropriate external interface with the routing table in the root containing your actual external gateway configuration.
Hopefully that all made sense- I worked through that kind of a setup in a test lab for a while before I was able to get it to perform the way I wanted it to for my situation. You may have some more complexity involved with dealing with two external connections and deciding out where you will want to NAT the traffic between interfaces.