I presume you are installing the security policy after you make any changes?
You may need to check GUIDBedit (or the management API) for any SAML VPN configurations. With the API, on the management server, you can use show-objects with a filter:
[Expert@mgmt01:0]# mgmt_cli -r true -f json show-objects filter saml-vpn
{
"from" : 1,
"to" : 1,
"total" : 1,
"objects" : [ {
"uid" : "b92e489c-31d1-4702-91c3-d268cdf0a074",
"name" : "SAML_VPN",
"type" : "CpmiIdentityProvider",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Objects/AuthenticationServer",
"color" : "black"
} ]
}
You can then use show-generic-object with that UID value and review the output for "loginUrl" and "providerID":
[Expert@mgmt01:0]# mgmt_cli -r true -f json show-generic-object uid b92e489c-31d1-4702-91c3-d268cdf0a074 |jq -r '.name, (.services[] |.loginUrl,.providerID)'
SAML_VPN
https://login.microsoftonline.com/81e...986b/saml2
https://sts.windows.net/81e...986b/
If you have more than one entry here, that means you have the SAML portal configured on multiple gateways. You may need to verify your VPN domains are configured correctly to make sure your client's IP is not anywhere in the group you have defined.
Maybe this output will give you some indication if you have a duplicate entry. No guarantees, however.
I'm still not sure why this would work while on your mobile hotspot versus your home ISP. This still indicates there's a possible DNS re-write issue, or your ISP could be filtering web traffic in some way, or perhaps your home router/NAT gateway is configured to do the same.