For what it's worth, the SSL situation is not quite that simple, as discussed in several recent posts on the
Qualys/SSL Labs blog. The primary way to mitigate BEAST server-side* is prioritizing the cipher RC4. However, every major browser other than Safari has fixed BEAST client-side, and the increasing number of attacks against RC4 are arguably more worrisome than BEAST is.
Your current SSL Labs report is pretty good, except for those problematic old cipher suites; you might also want to disable SSL 3. At least you support TLS 1.1 and 1.2 and modern cipher suites, too.
IMNSHO you should go with Qualys's current best practices, disregard BEAST, disable RC4 (if you can -- see the next one), and enable whatever is needed to support IE/XP. Definitely IE 8, and probably all the way down to IE 6. That would mean enabling at least one cipher suite that isn't forward-secure (meaning, one that doesn't say "DHE" or "ECDHE") -- it might have to be RC4 -- and maybe SSL 3 as well. I'm not sure.
BEAST vs. RC4 is debatable -- my opinion is just that. IE/XP, that's also somewhat debatable. Some people can cheerfully disregard supporting them, but I'd bet Linode has at least one client who would scream if SSL NodeBalancers didn't support them.
* It's easy to solve BEAST 100% by disabling SSL 3 and TLS 1.0. This course of action has the slight downside of breaking support for nearly all clients.
